General

  • Target

    7ea5bc32956bcccc8838cb268211ffb1_JaffaCakes118

  • Size

    3.0MB

  • Sample

    241030-lh7fjayqhv

  • MD5

    7ea5bc32956bcccc8838cb268211ffb1

  • SHA1

    b644746e6d39052b4bde30b63cccafd0cc0ae2df

  • SHA256

    349b51bc200d64ac3853afbea1667e839ff15cc5190df932f4e32fba53f701aa

  • SHA512

    318f7066b6087be0cad158f144a8770bcc3d4ba280fab1f00d8a6338a5e7e2e049f308c1f76cedc98b86786927edaa6dc6e17fc897bfd510ce2979816091cec5

  • SSDEEP

    98304:QQRCYoFa46lJGcC067xVM9dJMAW5LJr7+akspEcUT:Qokj6l6rxKHlw57+afIT

Malware Config

Targets

    • Target

      7ea5bc32956bcccc8838cb268211ffb1_JaffaCakes118

    • Size

      3.0MB

    • MD5

      7ea5bc32956bcccc8838cb268211ffb1

    • SHA1

      b644746e6d39052b4bde30b63cccafd0cc0ae2df

    • SHA256

      349b51bc200d64ac3853afbea1667e839ff15cc5190df932f4e32fba53f701aa

    • SHA512

      318f7066b6087be0cad158f144a8770bcc3d4ba280fab1f00d8a6338a5e7e2e049f308c1f76cedc98b86786927edaa6dc6e17fc897bfd510ce2979816091cec5

    • SSDEEP

      98304:QQRCYoFa46lJGcC067xVM9dJMAW5LJr7+akspEcUT:Qokj6l6rxKHlw57+afIT

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks