General
-
Target
ead38e34636b15ccbc4dfee64e6ce092_JaffaCakes118
-
Size
4.7MB
-
Sample
241213-lblkgstnf1
-
MD5
ead38e34636b15ccbc4dfee64e6ce092
-
SHA1
f4cd85387bf9dd8ff64a8ea54b2217a1c274468d
-
SHA256
17cc948ce12fa4f3937cd46a3d55ba91ee3888d2639e6e81a02f6668634ae45e
-
SHA512
483529bbde0bff6f52bee61d41c5350029b1d3f8326eb3a506490565ceec95905066e37acffb1a9d74847d8ffe128542b3bee4a0079163d2f2877464fd7a8953
-
SSDEEP
98304:yLuRfB6HMaYjE4NG4doFGuLGuS4sGTFO1F6P0Sc5sj7ACg58EZJkbSn:yLuRfwHmjE8WGuPssYkBjBg58Qn
Behavioral task
behavioral1
Sample
ead38e34636b15ccbc4dfee64e6ce092_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
ead38e34636b15ccbc4dfee64e6ce092_JaffaCakes118
-
Size
4.7MB
-
MD5
ead38e34636b15ccbc4dfee64e6ce092
-
SHA1
f4cd85387bf9dd8ff64a8ea54b2217a1c274468d
-
SHA256
17cc948ce12fa4f3937cd46a3d55ba91ee3888d2639e6e81a02f6668634ae45e
-
SHA512
483529bbde0bff6f52bee61d41c5350029b1d3f8326eb3a506490565ceec95905066e37acffb1a9d74847d8ffe128542b3bee4a0079163d2f2877464fd7a8953
-
SSDEEP
98304:yLuRfB6HMaYjE4NG4doFGuLGuS4sGTFO1F6P0Sc5sj7ACg58EZJkbSn:yLuRfwHmjE8WGuPssYkBjBg58Qn
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-