General

  • Target

    JaffaCakes118_a58db880f0af54721064fd5848573a72

  • Size

    3.6MB

  • Sample

    250108-xcj9la1lan

  • MD5

    a58db880f0af54721064fd5848573a72

  • SHA1

    4db954acd4feebbb49918211e83c0cbdf1cb4a10

  • SHA256

    a61f292250032a413af6305b8258cc6d1a50f04083063e3034ad7400db92be56

  • SHA512

    26e5034b2aed4b03115464f86b456f786fc246cbaef839776f1d14c5f56e4608da921015e4e6b31bf1a375c754285a98fd09935b0f80e677f3a387c1c5a04f76

  • SSDEEP

    98304:7Y323PnLFoz1zTLE/J8WySsKBmeEMLM2yTP+OXwac:2QPLS2yjKMCMxb7gh

Malware Config

Targets

    • Target

      JaffaCakes118_a58db880f0af54721064fd5848573a72

    • Size

      3.6MB

    • MD5

      a58db880f0af54721064fd5848573a72

    • SHA1

      4db954acd4feebbb49918211e83c0cbdf1cb4a10

    • SHA256

      a61f292250032a413af6305b8258cc6d1a50f04083063e3034ad7400db92be56

    • SHA512

      26e5034b2aed4b03115464f86b456f786fc246cbaef839776f1d14c5f56e4608da921015e4e6b31bf1a375c754285a98fd09935b0f80e677f3a387c1c5a04f76

    • SSDEEP

      98304:7Y323PnLFoz1zTLE/J8WySsKBmeEMLM2yTP+OXwac:2QPLS2yjKMCMxb7gh

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Revengerat family

    • RevengeRat Executable

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks