General
-
Target
e4102e8888cdd54defb8babef27dcaef_JaffaCakes118
-
Size
4.6MB
-
Sample
241212-brwqaavqdx
-
MD5
e4102e8888cdd54defb8babef27dcaef
-
SHA1
135eac299e0c1ea76572c0c5705a6df4e1388318
-
SHA256
6330461af12e55ea57217260de72f3bb9b70b1eff431b6ad1801ec23ebdb1b9b
-
SHA512
20ea116d8046de3cc70e0437f4f3fccb835e849248fe35ed41fa66d3547a8ba2cc8f7183de911e85da2e74b7382cef848b46da85444968adcc075b8384e62134
-
SSDEEP
98304:MrSoPdVaKU+Ft1IUKbz4FMyjpLxA3SXsV8Fg+BkZt6k08THF:M28dVaKUZDUFEDV8FgxZtR08L
Behavioral task
behavioral1
Sample
e4102e8888cdd54defb8babef27dcaef_JaffaCakes118.exe
Resource
win7-20241010-en
Malware Config
Targets
-
-
Target
e4102e8888cdd54defb8babef27dcaef_JaffaCakes118
-
Size
4.6MB
-
MD5
e4102e8888cdd54defb8babef27dcaef
-
SHA1
135eac299e0c1ea76572c0c5705a6df4e1388318
-
SHA256
6330461af12e55ea57217260de72f3bb9b70b1eff431b6ad1801ec23ebdb1b9b
-
SHA512
20ea116d8046de3cc70e0437f4f3fccb835e849248fe35ed41fa66d3547a8ba2cc8f7183de911e85da2e74b7382cef848b46da85444968adcc075b8384e62134
-
SSDEEP
98304:MrSoPdVaKU+Ft1IUKbz4FMyjpLxA3SXsV8Fg+BkZt6k08THF:M28dVaKUZDUFEDV8FgxZtR08L
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-