General

  • Target

    652560e32a8e3ce0dad09c0578c1ee9c_JaffaCakes118

  • Size

    2.6MB

  • Sample

    241021-ccjmvashlc

  • MD5

    652560e32a8e3ce0dad09c0578c1ee9c

  • SHA1

    ee96ee7674834639efa73ffb10104d9e7e9fa34f

  • SHA256

    4aa86ff85ce5de62282be90eca969634bb8f314b6516e6302b042fc69370a6b4

  • SHA512

    c0d75ff1292163569282730e9fb1044030b5f4e2be139c4659214cdf20ca487d457f3ebf6f93e87a320ad18dc6da838d1f6d8c660d83976aff00208935ba158c

  • SSDEEP

    49152:MsyeisqXokbsqzlzoIgAW+QGBzxDdwmd:ty9NokIqzxRdW+1xWO

Malware Config

Targets

    • Target

      652560e32a8e3ce0dad09c0578c1ee9c_JaffaCakes118

    • Size

      2.6MB

    • MD5

      652560e32a8e3ce0dad09c0578c1ee9c

    • SHA1

      ee96ee7674834639efa73ffb10104d9e7e9fa34f

    • SHA256

      4aa86ff85ce5de62282be90eca969634bb8f314b6516e6302b042fc69370a6b4

    • SHA512

      c0d75ff1292163569282730e9fb1044030b5f4e2be139c4659214cdf20ca487d457f3ebf6f93e87a320ad18dc6da838d1f6d8c660d83976aff00208935ba158c

    • SSDEEP

      49152:MsyeisqXokbsqzlzoIgAW+QGBzxDdwmd:ty9NokIqzxRdW+1xWO

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks