General
-
Target
fe6da89f800e17d62df98ce2298e8b5b_JaffaCakes118
-
Size
2.4MB
-
Sample
240421-e17qpabd4s
-
MD5
fe6da89f800e17d62df98ce2298e8b5b
-
SHA1
4b97d39ceead58f157e3cb07aeabb923f0a8e82e
-
SHA256
d2ed7a0c777e7f8e220dcd828d7baffb4c9566bae0c6e915e8945b27f068e3b7
-
SHA512
b54b4f4ae2a3b9111a87c7bb722f9d2612fc0401cac0aec992c365c1666c7f7422a4def7ebf433b572deea5ef69d354f2b0955a0b5047390f5ff4ea8a3e7fbbb
-
SSDEEP
49152:NAyArJVGQBIzY043H8zTFDpdc0J3kViW+9zHMo4ECL6dQ/0y:NA4zP438y+kVFV6dQz
Behavioral task
behavioral1
Sample
fe6da89f800e17d62df98ce2298e8b5b_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
fe6da89f800e17d62df98ce2298e8b5b_JaffaCakes118
-
Size
2.4MB
-
MD5
fe6da89f800e17d62df98ce2298e8b5b
-
SHA1
4b97d39ceead58f157e3cb07aeabb923f0a8e82e
-
SHA256
d2ed7a0c777e7f8e220dcd828d7baffb4c9566bae0c6e915e8945b27f068e3b7
-
SHA512
b54b4f4ae2a3b9111a87c7bb722f9d2612fc0401cac0aec992c365c1666c7f7422a4def7ebf433b572deea5ef69d354f2b0955a0b5047390f5ff4ea8a3e7fbbb
-
SSDEEP
49152:NAyArJVGQBIzY043H8zTFDpdc0J3kViW+9zHMo4ECL6dQ/0y:NA4zP438y+kVFV6dQz
-
SectopRAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-