General

  • Target

    43b0f49d7a7a77a6b2d01b72c236bbed_JaffaCakes118

  • Size

    2.5MB

  • Sample

    241014-xjzmvsvbrn

  • MD5

    43b0f49d7a7a77a6b2d01b72c236bbed

  • SHA1

    afd176fcd98f892c1ccde52af9bebe0938f3bce9

  • SHA256

    92ffa26c61cc19606169839965ab560aee9c9273ac97ee723db766a7cd6beca9

  • SHA512

    c4f761648ddb399c883ba659eb2796c87276d4fe4bcc270a2f26d73eede5928fd123579cf618797569a7fa00a831959e1bac4321f2de7e3ce79656ec793b7fd0

  • SSDEEP

    49152:iYE7ppIYtDOhQ4yXnuQRDo9ts1e1C/3HkP0W+jn9Hzd75AXsPkPlwO+HnRoA:iYElSSDOC4clROSSO3Hk8LR5AsMlwDRL

Malware Config

Targets

    • Target

      43b0f49d7a7a77a6b2d01b72c236bbed_JaffaCakes118

    • Size

      2.5MB

    • MD5

      43b0f49d7a7a77a6b2d01b72c236bbed

    • SHA1

      afd176fcd98f892c1ccde52af9bebe0938f3bce9

    • SHA256

      92ffa26c61cc19606169839965ab560aee9c9273ac97ee723db766a7cd6beca9

    • SHA512

      c4f761648ddb399c883ba659eb2796c87276d4fe4bcc270a2f26d73eede5928fd123579cf618797569a7fa00a831959e1bac4321f2de7e3ce79656ec793b7fd0

    • SSDEEP

      49152:iYE7ppIYtDOhQ4yXnuQRDo9ts1e1C/3HkP0W+jn9Hzd75AXsPkPlwO+HnRoA:iYElSSDOC4clROSSO3Hk8LR5AsMlwDRL

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks