General

  • Target

    d55c65d0f0a8f5466a712088ad8742b8_JaffaCakes118

  • Size

    2.5MB

  • Sample

    240909-apnffsvfrb

  • MD5

    d55c65d0f0a8f5466a712088ad8742b8

  • SHA1

    5f498741ab49b0bcb4cfb4c908b5030240864a39

  • SHA256

    5bffee1fb9e8942eb279a79f14179bf0cb4af6200d020184611e802acb767e7d

  • SHA512

    304d3b3b318b17cfd53b52f33885ccd3abafb23c45a23fee3b030af91d873e5b3d34def722d19e5616b6fbaff8dbbd5ebe4464505431c85c64dde8de339394bb

  • SSDEEP

    49152:r9d1iOZMesyWQyG8idbTjNt1L/kRU8eb5R4BKs6:r9DPMesyWQyivjVbTc

Malware Config

Targets

    • Target

      d55c65d0f0a8f5466a712088ad8742b8_JaffaCakes118

    • Size

      2.5MB

    • MD5

      d55c65d0f0a8f5466a712088ad8742b8

    • SHA1

      5f498741ab49b0bcb4cfb4c908b5030240864a39

    • SHA256

      5bffee1fb9e8942eb279a79f14179bf0cb4af6200d020184611e802acb767e7d

    • SHA512

      304d3b3b318b17cfd53b52f33885ccd3abafb23c45a23fee3b030af91d873e5b3d34def722d19e5616b6fbaff8dbbd5ebe4464505431c85c64dde8de339394bb

    • SSDEEP

      49152:r9d1iOZMesyWQyG8idbTjNt1L/kRU8eb5R4BKs6:r9DPMesyWQyivjVbTc

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks