General
-
Target
de505e872b2c698a009c6d074c01381b_JaffaCakes118
-
Size
1.9MB
-
Sample
241210-x7t3aavqhw
-
MD5
de505e872b2c698a009c6d074c01381b
-
SHA1
c104e7c0394d6fcc94422f4a76d37fff75cfcc70
-
SHA256
8ce704224d35fb53e9cc260916b8bed8ea502553d582b23592ab6dbbf3753e54
-
SHA512
3fe9f6b703054eabd6c5ba7ecd8b075cdcc53a24d0a8b848f04d1ff8c95e61e1202db111fb02395f2d8818a48dcd3fd88c80dd90c79611600d880ba92eb82466
-
SSDEEP
49152:9usl9MLCDbsxoa7Zjsixm/HnTOmOYhDjxT6YECxAmL:vkCDbGdlsqm/HTOmOUJET4
Static task
static1
Behavioral task
behavioral1
Sample
de505e872b2c698a009c6d074c01381b_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
de505e872b2c698a009c6d074c01381b_JaffaCakes118
-
Size
1.9MB
-
MD5
de505e872b2c698a009c6d074c01381b
-
SHA1
c104e7c0394d6fcc94422f4a76d37fff75cfcc70
-
SHA256
8ce704224d35fb53e9cc260916b8bed8ea502553d582b23592ab6dbbf3753e54
-
SHA512
3fe9f6b703054eabd6c5ba7ecd8b075cdcc53a24d0a8b848f04d1ff8c95e61e1202db111fb02395f2d8818a48dcd3fd88c80dd90c79611600d880ba92eb82466
-
SSDEEP
49152:9usl9MLCDbsxoa7Zjsixm/HnTOmOYhDjxT6YECxAmL:vkCDbGdlsqm/HTOmOUJET4
-
Raccoon Stealer V1 payload
-
Raccoon family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-