General

  • Target

    651dda9c1c2f12bec5a51df1344f5b6d_JaffaCakes118

  • Size

    2.1MB

  • Sample

    240722-2s9awatcpj

  • MD5

    651dda9c1c2f12bec5a51df1344f5b6d

  • SHA1

    d5edecc40781fb1d740bd48cf332231c882407bc

  • SHA256

    f50bbdcd2785aebcd03bca53cff3f7518e8a196dfdebbe6995989a332d76ba17

  • SHA512

    f04f717ee7f78216aac29b162834329563fc12d9edab1dc1a379ce35d55306ed2ea10395c6ea4b68c25bcbfa1806eb3506bc3179037e90a9e03f2317bbc508f3

  • SSDEEP

    49152:c9R8egZTr83JFAU/D7ct0QzPARbrsMiQoqUJH5Ax0:c9h4/85+UM0vRPsM0XY

Score
10/10

Malware Config

Targets

    • Target

      651dda9c1c2f12bec5a51df1344f5b6d_JaffaCakes118

    • Size

      2.1MB

    • MD5

      651dda9c1c2f12bec5a51df1344f5b6d

    • SHA1

      d5edecc40781fb1d740bd48cf332231c882407bc

    • SHA256

      f50bbdcd2785aebcd03bca53cff3f7518e8a196dfdebbe6995989a332d76ba17

    • SHA512

      f04f717ee7f78216aac29b162834329563fc12d9edab1dc1a379ce35d55306ed2ea10395c6ea4b68c25bcbfa1806eb3506bc3179037e90a9e03f2317bbc508f3

    • SSDEEP

      49152:c9R8egZTr83JFAU/D7ct0QzPARbrsMiQoqUJH5Ax0:c9h4/85+UM0vRPsM0XY

    Score
    10/10
    • Detect ZGRat V2

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

MITRE ATT&CK Enterprise v15

Tasks