General

  • Target

    94f6bcd1c6b35a1c5d55dd2dbe7211da_JaffaCakes118

  • Size

    1.3MB

  • Sample

    240813-18ycwayhnd

  • MD5

    94f6bcd1c6b35a1c5d55dd2dbe7211da

  • SHA1

    4d6359c3e61f8d54863d183d38ddc548c2a8702b

  • SHA256

    9237e5cae5f698d5ad9f6c61af8bd866e599abb05f5bc49474d98e269a29a588

  • SHA512

    832cfab9ee1f813f2a9a2fa3afae32646a00c10c71930cd034efa2c07d588facb9d782deba930376a499f2e76f1177a4d3a39bd2ca8bbdc37586e092c72ef8b0

  • SSDEEP

    24576:Mm4KIe7WgCBxOQyvlHxhXjqpdwWow1Rht956wCLVAWRCySnAZWX:14GQ9yvlHCdwSZT56wCL1bSn3

Malware Config

Extracted

Family

qakbot

Attributes
  • salt

    ��G�6�P�<�����U]����c)���z

Targets

    • Target

      94f6bcd1c6b35a1c5d55dd2dbe7211da_JaffaCakes118

    • Size

      1.3MB

    • MD5

      94f6bcd1c6b35a1c5d55dd2dbe7211da

    • SHA1

      4d6359c3e61f8d54863d183d38ddc548c2a8702b

    • SHA256

      9237e5cae5f698d5ad9f6c61af8bd866e599abb05f5bc49474d98e269a29a588

    • SHA512

      832cfab9ee1f813f2a9a2fa3afae32646a00c10c71930cd034efa2c07d588facb9d782deba930376a499f2e76f1177a4d3a39bd2ca8bbdc37586e092c72ef8b0

    • SSDEEP

      24576:Mm4KIe7WgCBxOQyvlHxhXjqpdwWow1Rht956wCLVAWRCySnAZWX:14GQ9yvlHCdwSZT56wCL1bSn3

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

3
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

System Location Discovery

1
T1614

System Language Discovery

1
T1614.001

Peripheral Device Discovery

1
T1120

Tasks