General
-
Target
d59c7cc6f109cb59fa55309f4f829692_JaffaCakes118
-
Size
3.0MB
-
Sample
241208-gvyxpsvrdv
-
MD5
d59c7cc6f109cb59fa55309f4f829692
-
SHA1
18c2361058540fdf9684ba07cef04085d90dbaa2
-
SHA256
a35bb31351cf385fe52b27c02642f2f99aed0d8fd472b4df12bf508faf3426d3
-
SHA512
532d135a1009a4a4985cbf15ad1cd1fe35a2ea5bb1a8ce15da5c2f5f6d7cb9b07491715b24539ad36702c664fb71e98a4f3aca1753691de5a02d73caa87bbc00
-
SSDEEP
49152:KDaBkTKFi1vosNsqTGmCOicY/TCJyMRrCUXVgGdCMKxdaFVOJjg5BRifqGkuPSXv:GaBEvo1qTga4AJTldCZmcUTRwkv1rlxB
Behavioral task
behavioral1
Sample
d59c7cc6f109cb59fa55309f4f829692_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d59c7cc6f109cb59fa55309f4f829692_JaffaCakes118
-
Size
3.0MB
-
MD5
d59c7cc6f109cb59fa55309f4f829692
-
SHA1
18c2361058540fdf9684ba07cef04085d90dbaa2
-
SHA256
a35bb31351cf385fe52b27c02642f2f99aed0d8fd472b4df12bf508faf3426d3
-
SHA512
532d135a1009a4a4985cbf15ad1cd1fe35a2ea5bb1a8ce15da5c2f5f6d7cb9b07491715b24539ad36702c664fb71e98a4f3aca1753691de5a02d73caa87bbc00
-
SSDEEP
49152:KDaBkTKFi1vosNsqTGmCOicY/TCJyMRrCUXVgGdCMKxdaFVOJjg5BRifqGkuPSXv:GaBEvo1qTga4AJTldCZmcUTRwkv1rlxB
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-