General

  • Target

    898609987898be4cddfcfe022358495a_JaffaCakes118

  • Size

    2.1MB

  • Sample

    241103-eht2waxlfj

  • MD5

    898609987898be4cddfcfe022358495a

  • SHA1

    bbef59a8ffb73da8bc3510f9df11e00d148d59f8

  • SHA256

    50486e0f140ab6e00179d43e5c1d888b18d555c8af25b42215e93c4447acb662

  • SHA512

    965bb0dea5437f6addb520d4a31fd9e940e39d1c800058898ead18bf5d0db8ee6c744340c6253b6e360bcecd58894035e4a7f798e892862c40f2ac9d298071b4

  • SSDEEP

    49152:vnoHDp3oyAY1d6gon7FRXFEKdYOscqlzhA0POhUWSzacQDxwF4Q:vyLJNonvXiGczhAmDacQDxwFB

Malware Config

Targets

    • Target

      898609987898be4cddfcfe022358495a_JaffaCakes118

    • Size

      2.1MB

    • MD5

      898609987898be4cddfcfe022358495a

    • SHA1

      bbef59a8ffb73da8bc3510f9df11e00d148d59f8

    • SHA256

      50486e0f140ab6e00179d43e5c1d888b18d555c8af25b42215e93c4447acb662

    • SHA512

      965bb0dea5437f6addb520d4a31fd9e940e39d1c800058898ead18bf5d0db8ee6c744340c6253b6e360bcecd58894035e4a7f798e892862c40f2ac9d298071b4

    • SSDEEP

      49152:vnoHDp3oyAY1d6gon7FRXFEKdYOscqlzhA0POhUWSzacQDxwF4Q:vyLJNonvXiGczhAmDacQDxwFB

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Checks whether UAC is enabled

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks