General

  • Target

    f8512f6dd51cf128a61a4a17a0f92b60_JaffaCakes118

  • Size

    3.1MB

  • Sample

    240418-thgtwahc55

  • MD5

    f8512f6dd51cf128a61a4a17a0f92b60

  • SHA1

    2f0a2b71c74e2ff59b03d01440bffe863b44c14d

  • SHA256

    fdf79edb46ab4cec562ed0eb7f51b97c7ac3760b00a47c50d71bf09854374f65

  • SHA512

    7d3bd17769b46c2828a28538e6d9f5b8fb0bf2be1eea53aa90be828b3eaa27f183817ceb6201a0cbde460cd793a5454621d9dcfa513ddafec33d8685468ac855

  • SSDEEP

    98304:x2oS+VGv3ej8dvntWdrrlE/U2x8SUj2Rd:LlGGwFnodrpqU88SPd

Malware Config

Targets

    • Target

      f8512f6dd51cf128a61a4a17a0f92b60_JaffaCakes118

    • Size

      3.1MB

    • MD5

      f8512f6dd51cf128a61a4a17a0f92b60

    • SHA1

      2f0a2b71c74e2ff59b03d01440bffe863b44c14d

    • SHA256

      fdf79edb46ab4cec562ed0eb7f51b97c7ac3760b00a47c50d71bf09854374f65

    • SHA512

      7d3bd17769b46c2828a28538e6d9f5b8fb0bf2be1eea53aa90be828b3eaa27f183817ceb6201a0cbde460cd793a5454621d9dcfa513ddafec33d8685468ac855

    • SSDEEP

      98304:x2oS+VGv3ej8dvntWdrrlE/U2x8SUj2Rd:LlGGwFnodrpqU88SPd

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks