General
-
Target
898609987898be4cddfcfe022358495a_JaffaCakes118
-
Size
2.1MB
-
Sample
241103-eht2waxlfj
-
MD5
898609987898be4cddfcfe022358495a
-
SHA1
bbef59a8ffb73da8bc3510f9df11e00d148d59f8
-
SHA256
50486e0f140ab6e00179d43e5c1d888b18d555c8af25b42215e93c4447acb662
-
SHA512
965bb0dea5437f6addb520d4a31fd9e940e39d1c800058898ead18bf5d0db8ee6c744340c6253b6e360bcecd58894035e4a7f798e892862c40f2ac9d298071b4
-
SSDEEP
49152:vnoHDp3oyAY1d6gon7FRXFEKdYOscqlzhA0POhUWSzacQDxwF4Q:vyLJNonvXiGczhAmDacQDxwFB
Static task
static1
Behavioral task
behavioral1
Sample
898609987898be4cddfcfe022358495a_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
898609987898be4cddfcfe022358495a_JaffaCakes118
-
Size
2.1MB
-
MD5
898609987898be4cddfcfe022358495a
-
SHA1
bbef59a8ffb73da8bc3510f9df11e00d148d59f8
-
SHA256
50486e0f140ab6e00179d43e5c1d888b18d555c8af25b42215e93c4447acb662
-
SHA512
965bb0dea5437f6addb520d4a31fd9e940e39d1c800058898ead18bf5d0db8ee6c744340c6253b6e360bcecd58894035e4a7f798e892862c40f2ac9d298071b4
-
SSDEEP
49152:vnoHDp3oyAY1d6gon7FRXFEKdYOscqlzhA0POhUWSzacQDxwF4Q:vyLJNonvXiGczhAmDacQDxwFB
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-