General

  • Target

    7b0106b703b66a0b5306e56583ec58a5_JaffaCakes118

  • Size

    3.3MB

  • Sample

    241028-215yesyhld

  • MD5

    7b0106b703b66a0b5306e56583ec58a5

  • SHA1

    b9284a2be4e84c90494dfe638e96fc082ee8fddb

  • SHA256

    32233bfbd2bc74ec250803a1e9eb54e6478c47d509c5a18fe06a9460da162e91

  • SHA512

    d443859bc56ae7f21d8c9adce2319a0b165d6a31633c8fa0609fd958e151f9c492ef8b2e5fa3f3d86c67432ab122f6990966164e770a0905c5290755a4720b15

  • SSDEEP

    49152:R3ms4Y7cX0kZkwdAFq4gwjXa44z2rc/aqxotrT7dKaQP:R3mUfk/dbojq44ycCqOtrdKaA

Malware Config

Targets

    • Target

      7b0106b703b66a0b5306e56583ec58a5_JaffaCakes118

    • Size

      3.3MB

    • MD5

      7b0106b703b66a0b5306e56583ec58a5

    • SHA1

      b9284a2be4e84c90494dfe638e96fc082ee8fddb

    • SHA256

      32233bfbd2bc74ec250803a1e9eb54e6478c47d509c5a18fe06a9460da162e91

    • SHA512

      d443859bc56ae7f21d8c9adce2319a0b165d6a31633c8fa0609fd958e151f9c492ef8b2e5fa3f3d86c67432ab122f6990966164e770a0905c5290755a4720b15

    • SSDEEP

      49152:R3ms4Y7cX0kZkwdAFq4gwjXa44z2rc/aqxotrT7dKaQP:R3mUfk/dbojq44ycCqOtrdKaA

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks