General
-
Target
652560e32a8e3ce0dad09c0578c1ee9c_JaffaCakes118
-
Size
2.6MB
-
Sample
241021-ccjmvashlc
-
MD5
652560e32a8e3ce0dad09c0578c1ee9c
-
SHA1
ee96ee7674834639efa73ffb10104d9e7e9fa34f
-
SHA256
4aa86ff85ce5de62282be90eca969634bb8f314b6516e6302b042fc69370a6b4
-
SHA512
c0d75ff1292163569282730e9fb1044030b5f4e2be139c4659214cdf20ca487d457f3ebf6f93e87a320ad18dc6da838d1f6d8c660d83976aff00208935ba158c
-
SSDEEP
49152:MsyeisqXokbsqzlzoIgAW+QGBzxDdwmd:ty9NokIqzxRdW+1xWO
Behavioral task
behavioral1
Sample
652560e32a8e3ce0dad09c0578c1ee9c_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
652560e32a8e3ce0dad09c0578c1ee9c_JaffaCakes118
-
Size
2.6MB
-
MD5
652560e32a8e3ce0dad09c0578c1ee9c
-
SHA1
ee96ee7674834639efa73ffb10104d9e7e9fa34f
-
SHA256
4aa86ff85ce5de62282be90eca969634bb8f314b6516e6302b042fc69370a6b4
-
SHA512
c0d75ff1292163569282730e9fb1044030b5f4e2be139c4659214cdf20ca487d457f3ebf6f93e87a320ad18dc6da838d1f6d8c660d83976aff00208935ba158c
-
SSDEEP
49152:MsyeisqXokbsqzlzoIgAW+QGBzxDdwmd:ty9NokIqzxRdW+1xWO
-
SectopRAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-