General

  • Target

    9a5244860e2e814c8e251a92ab8c385b_JaffaCakes118

  • Size

    2.8MB

  • Sample

    241125-kah8astmem

  • MD5

    9a5244860e2e814c8e251a92ab8c385b

  • SHA1

    3501f0ff1a6f2c7950c255d9cc5d99cec2554b4f

  • SHA256

    39ab617b51759c08779bce3eb4f6082076d97a1d45997a474dc50faf63d2215c

  • SHA512

    2f7b1ef880b05717369112b2051dc5491a655613b6dee192df373dc06eb725f601c592ac69aa1d66756725803d2b4f8063bcf441e592fa38846d2994c274612e

  • SSDEEP

    49152:5t3FLuQvezzfYgGK5HfcEN/nehp4pT0zuFNFtg9cKPoRB:5tFLu7XfYgB64eX4OsryU

Malware Config

Targets

    • Target

      9a5244860e2e814c8e251a92ab8c385b_JaffaCakes118

    • Size

      2.8MB

    • MD5

      9a5244860e2e814c8e251a92ab8c385b

    • SHA1

      3501f0ff1a6f2c7950c255d9cc5d99cec2554b4f

    • SHA256

      39ab617b51759c08779bce3eb4f6082076d97a1d45997a474dc50faf63d2215c

    • SHA512

      2f7b1ef880b05717369112b2051dc5491a655613b6dee192df373dc06eb725f601c592ac69aa1d66756725803d2b4f8063bcf441e592fa38846d2994c274612e

    • SSDEEP

      49152:5t3FLuQvezzfYgGK5HfcEN/nehp4pT0zuFNFtg9cKPoRB:5tFLu7XfYgB64eX4OsryU

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks