General
-
Target
0b122302c692af0213db722190b8e513_JaffaCakes118
-
Size
1.9MB
-
Sample
240328-vgbf5sbb5t
-
MD5
0b122302c692af0213db722190b8e513
-
SHA1
38c47acf26cc63fad4ef4033150093e45d59655a
-
SHA256
e271f1c40db30b3cf52dfa09617a34632db3edac155c03dfbfcb9c2f05c1c1cd
-
SHA512
d4c3aea5c232bb0f3412308daad00e63d8ada2d1273836877ded7c04ae51f0b6561ece13d9e291c3ca83d58571243a8cfdfa20a5cf47c5840a1c6e2b2c6a6c76
-
SSDEEP
24576:JQgPK5BP+BoCLxjJr8/4vLudZ4UnDRIXnO+THFVli5kmIkYXBInLjo/Tq1i3RfJw:JQgPKbY0/qmZ4Und6DkmmIkQz/TqGCum
Behavioral task
behavioral1
Sample
0b122302c692af0213db722190b8e513_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
0b122302c692af0213db722190b8e513_JaffaCakes118
-
Size
1.9MB
-
MD5
0b122302c692af0213db722190b8e513
-
SHA1
38c47acf26cc63fad4ef4033150093e45d59655a
-
SHA256
e271f1c40db30b3cf52dfa09617a34632db3edac155c03dfbfcb9c2f05c1c1cd
-
SHA512
d4c3aea5c232bb0f3412308daad00e63d8ada2d1273836877ded7c04ae51f0b6561ece13d9e291c3ca83d58571243a8cfdfa20a5cf47c5840a1c6e2b2c6a6c76
-
SSDEEP
24576:JQgPK5BP+BoCLxjJr8/4vLudZ4UnDRIXnO+THFVli5kmIkYXBInLjo/Tq1i3RfJw:JQgPKbY0/qmZ4Und6DkmmIkQz/TqGCum
-
Raccoon Stealer V1 payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-