General
-
Target
e4b908985c9010780f9bc972dc34883e_JaffaCakes118
-
Size
24.1MB
-
Sample
240407-mmkb8sbb93
-
MD5
e4b908985c9010780f9bc972dc34883e
-
SHA1
a4b802e0e4c9485d4733f2f8e836cccef17cc587
-
SHA256
0a3a36fb5bca270716b5836355d506fbde4dcfeb66c526d7310aa60f99aac49b
-
SHA512
69c3533ab9a95f9330001720cf4ccde47eafc203b416b4aadb7352831b7f7a8c02e0543543c0bc443b5f8915fb834f614b3a0c580eefc1f914dbdb3df0fa7b1d
-
SSDEEP
393216:D8zGfF0zm9Vj2bVl8WvEOcc2FReqN14JkgKTLDF9Ky9LWN1QsTFrdRSqPPF+:8GN0zOVW8WM3DHvJDF9KPN1ntdPPF+
Static task
static1
Behavioral task
behavioral1
Sample
e4b908985c9010780f9bc972dc34883e_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
e4b908985c9010780f9bc972dc34883e_JaffaCakes118
-
Size
24.1MB
-
MD5
e4b908985c9010780f9bc972dc34883e
-
SHA1
a4b802e0e4c9485d4733f2f8e836cccef17cc587
-
SHA256
0a3a36fb5bca270716b5836355d506fbde4dcfeb66c526d7310aa60f99aac49b
-
SHA512
69c3533ab9a95f9330001720cf4ccde47eafc203b416b4aadb7352831b7f7a8c02e0543543c0bc443b5f8915fb834f614b3a0c580eefc1f914dbdb3df0fa7b1d
-
SSDEEP
393216:D8zGfF0zm9Vj2bVl8WvEOcc2FReqN14JkgKTLDF9Ky9LWN1QsTFrdRSqPPF+:8GN0zOVW8WM3DHvJDF9KPN1ntdPPF+
-
Raccoon Stealer V1 payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-