General
-
Target
4a49efa41cefb3734702ee32aeb05f42_JaffaCakes118
-
Size
8.5MB
-
Sample
241015-2bzp4svcjj
-
MD5
4a49efa41cefb3734702ee32aeb05f42
-
SHA1
c0f6707d89883fe500328016f5bd49d36f9277d0
-
SHA256
400c822e016849dfb4c4b2248b3f8f01ed806a18184aae2952a94339601ebcad
-
SHA512
b51e0493651e4623e00055bd337159a4aa271bb6d198599b59beeef13dadc567feb57c9a22e92472c62c6534cd9d21695892e9f78ee37e2a9674516a7623cab6
-
SSDEEP
196608:+22qStMXWFvRu+jAxsOfDWO46BeEAT4I1acY1aNBbnrhZllgRJjX/x+caMgyuVRV:jS+G5AxsOfDp46BeEAT4I1acYcNBbnrH
Behavioral task
behavioral1
Sample
4a49efa41cefb3734702ee32aeb05f42_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
4a49efa41cefb3734702ee32aeb05f42_JaffaCakes118
-
Size
8.5MB
-
MD5
4a49efa41cefb3734702ee32aeb05f42
-
SHA1
c0f6707d89883fe500328016f5bd49d36f9277d0
-
SHA256
400c822e016849dfb4c4b2248b3f8f01ed806a18184aae2952a94339601ebcad
-
SHA512
b51e0493651e4623e00055bd337159a4aa271bb6d198599b59beeef13dadc567feb57c9a22e92472c62c6534cd9d21695892e9f78ee37e2a9674516a7623cab6
-
SSDEEP
196608:+22qStMXWFvRu+jAxsOfDWO46BeEAT4I1acY1aNBbnrhZllgRJjX/x+caMgyuVRV:jS+G5AxsOfDp46BeEAT4I1acYcNBbnrH
-
SectopRAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-