General

  • Target

    fc4a9c2c74748dfe0fae2ac5bdeda341_JaffaCakes118

  • Size

    3.1MB

  • Sample

    240420-jt365scf6y

  • MD5

    fc4a9c2c74748dfe0fae2ac5bdeda341

  • SHA1

    185add6ebd0afcc63d9e4d2570ced3de67da5b60

  • SHA256

    d746a7cbfb99ea33a59fdc89392c7d36763f728d2ce2525ee117650605a59a7a

  • SHA512

    fc720f2ee49792d1e317de96465843893e3de5b50c95a027d8a0574aef9c9f6c4863b461897d38a23353273abcfc771bd46e47ce97684c16060017a5af4d9b5c

  • SSDEEP

    98304:vbYT/ecrd6OjPSSrmRWmrvqUWg8llfY8Kdiz:8TGcd/qZRWmrHUfY80e

Malware Config

Targets

    • Target

      fc4a9c2c74748dfe0fae2ac5bdeda341_JaffaCakes118

    • Size

      3.1MB

    • MD5

      fc4a9c2c74748dfe0fae2ac5bdeda341

    • SHA1

      185add6ebd0afcc63d9e4d2570ced3de67da5b60

    • SHA256

      d746a7cbfb99ea33a59fdc89392c7d36763f728d2ce2525ee117650605a59a7a

    • SHA512

      fc720f2ee49792d1e317de96465843893e3de5b50c95a027d8a0574aef9c9f6c4863b461897d38a23353273abcfc771bd46e47ce97684c16060017a5af4d9b5c

    • SSDEEP

      98304:vbYT/ecrd6OjPSSrmRWmrvqUWg8llfY8Kdiz:8TGcd/qZRWmrHUfY80e

    • Detect ZGRat V1

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks