General
-
Target
e9b1d4e23a8d4113905e0bcf15d786be_JaffaCakes118
-
Size
832KB
-
Sample
241213-d5dsqsyqbl
-
MD5
e9b1d4e23a8d4113905e0bcf15d786be
-
SHA1
4e38509cacf770623ce43c6d4d51a79269f201c5
-
SHA256
96f9482038457935be7d32971dbeaf8d0ce56d9c0dee163b205b17d62276c790
-
SHA512
754352b83d9a028608a93c965f347c6ee7927f61954b2b0e14def395360e6ed9b2be63d301d8b5375880ea9d4d4360261056dcef29a057be984f7cc30ccc0ec3
-
SSDEEP
24576:OoRF0c43r78PbLYKKg3uxfZNgjvVWmL28:LRmX3r78TEK93ut7gbVWmX
Static task
static1
Behavioral task
behavioral1
Sample
e9b1d4e23a8d4113905e0bcf15d786be_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e9b1d4e23a8d4113905e0bcf15d786be_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
superhyper007
Targets
-
-
Target
e9b1d4e23a8d4113905e0bcf15d786be_JaffaCakes118
-
Size
832KB
-
MD5
e9b1d4e23a8d4113905e0bcf15d786be
-
SHA1
4e38509cacf770623ce43c6d4d51a79269f201c5
-
SHA256
96f9482038457935be7d32971dbeaf8d0ce56d9c0dee163b205b17d62276c790
-
SHA512
754352b83d9a028608a93c965f347c6ee7927f61954b2b0e14def395360e6ed9b2be63d301d8b5375880ea9d4d4360261056dcef29a057be984f7cc30ccc0ec3
-
SSDEEP
24576:OoRF0c43r78PbLYKKg3uxfZNgjvVWmL28:LRmX3r78TEK93ut7gbVWmX
-
Revengerat family
-
RevengeRat Executable
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-