General
-
Target
43b0f49d7a7a77a6b2d01b72c236bbed_JaffaCakes118
-
Size
2.5MB
-
Sample
241014-xjzmvsvbrn
-
MD5
43b0f49d7a7a77a6b2d01b72c236bbed
-
SHA1
afd176fcd98f892c1ccde52af9bebe0938f3bce9
-
SHA256
92ffa26c61cc19606169839965ab560aee9c9273ac97ee723db766a7cd6beca9
-
SHA512
c4f761648ddb399c883ba659eb2796c87276d4fe4bcc270a2f26d73eede5928fd123579cf618797569a7fa00a831959e1bac4321f2de7e3ce79656ec793b7fd0
-
SSDEEP
49152:iYE7ppIYtDOhQ4yXnuQRDo9ts1e1C/3HkP0W+jn9Hzd75AXsPkPlwO+HnRoA:iYElSSDOC4clROSSO3Hk8LR5AsMlwDRL
Behavioral task
behavioral1
Sample
43b0f49d7a7a77a6b2d01b72c236bbed_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
43b0f49d7a7a77a6b2d01b72c236bbed_JaffaCakes118
-
Size
2.5MB
-
MD5
43b0f49d7a7a77a6b2d01b72c236bbed
-
SHA1
afd176fcd98f892c1ccde52af9bebe0938f3bce9
-
SHA256
92ffa26c61cc19606169839965ab560aee9c9273ac97ee723db766a7cd6beca9
-
SHA512
c4f761648ddb399c883ba659eb2796c87276d4fe4bcc270a2f26d73eede5928fd123579cf618797569a7fa00a831959e1bac4321f2de7e3ce79656ec793b7fd0
-
SSDEEP
49152:iYE7ppIYtDOhQ4yXnuQRDo9ts1e1C/3HkP0W+jn9Hzd75AXsPkPlwO+HnRoA:iYElSSDOC4clROSSO3Hk8LR5AsMlwDRL
-
SectopRAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-