General

  • Target

    e4102e8888cdd54defb8babef27dcaef_JaffaCakes118

  • Size

    4.6MB

  • Sample

    241212-brwqaavqdx

  • MD5

    e4102e8888cdd54defb8babef27dcaef

  • SHA1

    135eac299e0c1ea76572c0c5705a6df4e1388318

  • SHA256

    6330461af12e55ea57217260de72f3bb9b70b1eff431b6ad1801ec23ebdb1b9b

  • SHA512

    20ea116d8046de3cc70e0437f4f3fccb835e849248fe35ed41fa66d3547a8ba2cc8f7183de911e85da2e74b7382cef848b46da85444968adcc075b8384e62134

  • SSDEEP

    98304:MrSoPdVaKU+Ft1IUKbz4FMyjpLxA3SXsV8Fg+BkZt6k08THF:M28dVaKUZDUFEDV8FgxZtR08L

Malware Config

Targets

    • Target

      e4102e8888cdd54defb8babef27dcaef_JaffaCakes118

    • Size

      4.6MB

    • MD5

      e4102e8888cdd54defb8babef27dcaef

    • SHA1

      135eac299e0c1ea76572c0c5705a6df4e1388318

    • SHA256

      6330461af12e55ea57217260de72f3bb9b70b1eff431b6ad1801ec23ebdb1b9b

    • SHA512

      20ea116d8046de3cc70e0437f4f3fccb835e849248fe35ed41fa66d3547a8ba2cc8f7183de911e85da2e74b7382cef848b46da85444968adcc075b8384e62134

    • SSDEEP

      98304:MrSoPdVaKU+Ft1IUKbz4FMyjpLxA3SXsV8Fg+BkZt6k08THF:M28dVaKUZDUFEDV8FgxZtR08L

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks