General

  • Target

    fbcd0b5ce57ffefed1b19cec0b381295_JaffaCakes118

  • Size

    3.2MB

  • Sample

    240420-dp572sfg4x

  • MD5

    fbcd0b5ce57ffefed1b19cec0b381295

  • SHA1

    93e9a7b77b58888aaf96abea850ada77acdbe274

  • SHA256

    86cf5cfe55d2e7e14c698d3425f181b9a47d72d7b840ff540dc690ac42f91282

  • SHA512

    a457de1b7dbd798c34df303bcf3488c6f36dbc1a433f1e59f46a15b3c8135bf0605c9c1d08e0e349ee9296be04a32a7d1c11ddd043fdd3274927da18a9394583

  • SSDEEP

    98304:163LDtgQNHaoMslnmhhIpt6W9rOWHA37Ai72G/wwH:KL1RaJslnEhg6UxH2xh/wM

Malware Config

Targets

    • Target

      fbcd0b5ce57ffefed1b19cec0b381295_JaffaCakes118

    • Size

      3.2MB

    • MD5

      fbcd0b5ce57ffefed1b19cec0b381295

    • SHA1

      93e9a7b77b58888aaf96abea850ada77acdbe274

    • SHA256

      86cf5cfe55d2e7e14c698d3425f181b9a47d72d7b840ff540dc690ac42f91282

    • SHA512

      a457de1b7dbd798c34df303bcf3488c6f36dbc1a433f1e59f46a15b3c8135bf0605c9c1d08e0e349ee9296be04a32a7d1c11ddd043fdd3274927da18a9394583

    • SSDEEP

      98304:163LDtgQNHaoMslnmhhIpt6W9rOWHA37Ai72G/wwH:KL1RaJslnEhg6UxH2xh/wM

    Score
    9/10
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks