General

  • Target

    JaffaCakes118_19c8f7ceabfd03accfcbfb8698aabdd2

  • Size

    57KB

  • Sample

    250106-kmg6rsvjcj

  • MD5

    19c8f7ceabfd03accfcbfb8698aabdd2

  • SHA1

    7450580ec60ad5c82d6be51cbcf7f9a3cf55e25f

  • SHA256

    f10c42d174ddd54feb7137a49807904d489b9b7345a032a7b393b7e8f612d9e4

  • SHA512

    cb3507d419a7368665d32f255ddb830776a0f2d01287f9a8b559a53aaaa06d04f2396da8066553cf73e7e87e090f7bf3434ace5384a7426883db6ca90182ebe4

  • SSDEEP

    768:9/NrSYzvletjumiFzI35f+rouhpW05clQvmNfA9EZ4UENQ2TA/:+YrEjiNIl+rouhpW0cfNfA9pUEA

Malware Config

Targets

    • Target

      JaffaCakes118_19c8f7ceabfd03accfcbfb8698aabdd2

    • Size

      57KB

    • MD5

      19c8f7ceabfd03accfcbfb8698aabdd2

    • SHA1

      7450580ec60ad5c82d6be51cbcf7f9a3cf55e25f

    • SHA256

      f10c42d174ddd54feb7137a49807904d489b9b7345a032a7b393b7e8f612d9e4

    • SHA512

      cb3507d419a7368665d32f255ddb830776a0f2d01287f9a8b559a53aaaa06d04f2396da8066553cf73e7e87e090f7bf3434ace5384a7426883db6ca90182ebe4

    • SSDEEP

      768:9/NrSYzvletjumiFzI35f+rouhpW05clQvmNfA9EZ4UENQ2TA/:+YrEjiNIl+rouhpW0cfNfA9pUEA

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Uses the VBS compiler for execution

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks