General

  • Target

    ead38e34636b15ccbc4dfee64e6ce092_JaffaCakes118

  • Size

    4.7MB

  • Sample

    241213-lblkgstnf1

  • MD5

    ead38e34636b15ccbc4dfee64e6ce092

  • SHA1

    f4cd85387bf9dd8ff64a8ea54b2217a1c274468d

  • SHA256

    17cc948ce12fa4f3937cd46a3d55ba91ee3888d2639e6e81a02f6668634ae45e

  • SHA512

    483529bbde0bff6f52bee61d41c5350029b1d3f8326eb3a506490565ceec95905066e37acffb1a9d74847d8ffe128542b3bee4a0079163d2f2877464fd7a8953

  • SSDEEP

    98304:yLuRfB6HMaYjE4NG4doFGuLGuS4sGTFO1F6P0Sc5sj7ACg58EZJkbSn:yLuRfwHmjE8WGuPssYkBjBg58Qn

Malware Config

Targets

    • Target

      ead38e34636b15ccbc4dfee64e6ce092_JaffaCakes118

    • Size

      4.7MB

    • MD5

      ead38e34636b15ccbc4dfee64e6ce092

    • SHA1

      f4cd85387bf9dd8ff64a8ea54b2217a1c274468d

    • SHA256

      17cc948ce12fa4f3937cd46a3d55ba91ee3888d2639e6e81a02f6668634ae45e

    • SHA512

      483529bbde0bff6f52bee61d41c5350029b1d3f8326eb3a506490565ceec95905066e37acffb1a9d74847d8ffe128542b3bee4a0079163d2f2877464fd7a8953

    • SSDEEP

      98304:yLuRfB6HMaYjE4NG4doFGuLGuS4sGTFO1F6P0Sc5sj7ACg58EZJkbSn:yLuRfwHmjE8WGuPssYkBjBg58Qn

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks