General
-
Target
7b0106b703b66a0b5306e56583ec58a5_JaffaCakes118
-
Size
3.3MB
-
Sample
241028-215yesyhld
-
MD5
7b0106b703b66a0b5306e56583ec58a5
-
SHA1
b9284a2be4e84c90494dfe638e96fc082ee8fddb
-
SHA256
32233bfbd2bc74ec250803a1e9eb54e6478c47d509c5a18fe06a9460da162e91
-
SHA512
d443859bc56ae7f21d8c9adce2319a0b165d6a31633c8fa0609fd958e151f9c492ef8b2e5fa3f3d86c67432ab122f6990966164e770a0905c5290755a4720b15
-
SSDEEP
49152:R3ms4Y7cX0kZkwdAFq4gwjXa44z2rc/aqxotrT7dKaQP:R3mUfk/dbojq44ycCqOtrdKaA
Behavioral task
behavioral1
Sample
7b0106b703b66a0b5306e56583ec58a5_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
7b0106b703b66a0b5306e56583ec58a5_JaffaCakes118
-
Size
3.3MB
-
MD5
7b0106b703b66a0b5306e56583ec58a5
-
SHA1
b9284a2be4e84c90494dfe638e96fc082ee8fddb
-
SHA256
32233bfbd2bc74ec250803a1e9eb54e6478c47d509c5a18fe06a9460da162e91
-
SHA512
d443859bc56ae7f21d8c9adce2319a0b165d6a31633c8fa0609fd958e151f9c492ef8b2e5fa3f3d86c67432ab122f6990966164e770a0905c5290755a4720b15
-
SSDEEP
49152:R3ms4Y7cX0kZkwdAFq4gwjXa44z2rc/aqxotrT7dKaQP:R3mUfk/dbojq44ycCqOtrdKaA
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-