General

  • Target

    739c514f65b06ba41f5de345ae8e3e12_JaffaCakes118

  • Size

    3.3MB

  • Sample

    240726-l8bfsa1brp

  • MD5

    739c514f65b06ba41f5de345ae8e3e12

  • SHA1

    bcc245b1dc6086900b14ea7145bd24d2b0f25801

  • SHA256

    49661c5ee88d50c8a4bb78cb5e75bb4cf269664b2ce58af4954836c2af91707e

  • SHA512

    ec86fbfb1ac25d72b715eae1260476d7a27e169a4b2b3a096773b7b6b64477efeabd618bba81e3fe77140417933aa715c137e0c30ec8ebddeddcde17b0403830

  • SSDEEP

    49152:CJAUtY8o7f22cEIxWs19JVDYfDlyKwukTJEIXURxF7rHl+0W:5s4fqEIoyTDYJaTJEIXURxF7U

Malware Config

Targets

    • Target

      739c514f65b06ba41f5de345ae8e3e12_JaffaCakes118

    • Size

      3.3MB

    • MD5

      739c514f65b06ba41f5de345ae8e3e12

    • SHA1

      bcc245b1dc6086900b14ea7145bd24d2b0f25801

    • SHA256

      49661c5ee88d50c8a4bb78cb5e75bb4cf269664b2ce58af4954836c2af91707e

    • SHA512

      ec86fbfb1ac25d72b715eae1260476d7a27e169a4b2b3a096773b7b6b64477efeabd618bba81e3fe77140417933aa715c137e0c30ec8ebddeddcde17b0403830

    • SSDEEP

      49152:CJAUtY8o7f22cEIxWs19JVDYfDlyKwukTJEIXURxF7rHl+0W:5s4fqEIoyTDYJaTJEIXURxF7U

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks