General
-
Target
faee06a90a9cbbff9407ced9494fd7c3_JaffaCakes118
-
Size
3.3MB
-
Sample
240419-xbkhzadb5y
-
MD5
faee06a90a9cbbff9407ced9494fd7c3
-
SHA1
c580e0907ef1bb5b5728a53beec4db14bc153625
-
SHA256
34f27154b9594d049db97fa647be0bcef4228bed786e21f4899ca0da3e0874f7
-
SHA512
a83d279b26106e8921b15f8f5db88d28567e975b4980f52958d7f19db130b19ecf43f979817c4d3c99ebddabdef1104ba22fd23f4e31c255d1f87f9e8c214ba2
-
SSDEEP
98304:SVuD8LsOi4HhOqylicerYxyQHWjv41ABa8ep:SVe8L5Oqz7cB71ABa8q
Behavioral task
behavioral1
Sample
faee06a90a9cbbff9407ced9494fd7c3_JaffaCakes118.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
faee06a90a9cbbff9407ced9494fd7c3_JaffaCakes118
-
Size
3.3MB
-
MD5
faee06a90a9cbbff9407ced9494fd7c3
-
SHA1
c580e0907ef1bb5b5728a53beec4db14bc153625
-
SHA256
34f27154b9594d049db97fa647be0bcef4228bed786e21f4899ca0da3e0874f7
-
SHA512
a83d279b26106e8921b15f8f5db88d28567e975b4980f52958d7f19db130b19ecf43f979817c4d3c99ebddabdef1104ba22fd23f4e31c255d1f87f9e8c214ba2
-
SSDEEP
98304:SVuD8LsOi4HhOqylicerYxyQHWjv41ABa8ep:SVe8L5Oqz7cB71ABa8q
-
Detects Echelon Stealer payload
-
Echelon - DarkStealer Fork
Payload resembles modified variant of Echelon Stealer called DarkStealer.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-