General
-
Target
f7b394a8bc50dadfa41a243e5c9dacb7_JaffaCakes118
-
Size
5.4MB
-
Sample
241216-g2y62sxqfw
-
MD5
f7b394a8bc50dadfa41a243e5c9dacb7
-
SHA1
c8d02c4c38fcd761824b8dd690c5497bca2049bd
-
SHA256
5bc81daaa66b1f8bdf92103ba33d416da10a19304d83bbc6210c52320ed2a889
-
SHA512
de60604c11f27b647d3844a81861c117f6ed6eca53d8c72644011c532080cc4f36b43ad945b427ab2ef199ec676c6c20b4a43ba5a36301c4466666dd5a002fcc
-
SSDEEP
98304:SpNz/yAfY7LpoNKavfAlidC06HsxY8MICTEQR+NqrH6GrflwC3B:GYLK8qfpUaHqEQRWqj6ON7
Behavioral task
behavioral1
Sample
f7b394a8bc50dadfa41a243e5c9dacb7_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
f7b394a8bc50dadfa41a243e5c9dacb7_JaffaCakes118
-
Size
5.4MB
-
MD5
f7b394a8bc50dadfa41a243e5c9dacb7
-
SHA1
c8d02c4c38fcd761824b8dd690c5497bca2049bd
-
SHA256
5bc81daaa66b1f8bdf92103ba33d416da10a19304d83bbc6210c52320ed2a889
-
SHA512
de60604c11f27b647d3844a81861c117f6ed6eca53d8c72644011c532080cc4f36b43ad945b427ab2ef199ec676c6c20b4a43ba5a36301c4466666dd5a002fcc
-
SSDEEP
98304:SpNz/yAfY7LpoNKavfAlidC06HsxY8MICTEQR+NqrH6GrflwC3B:GYLK8qfpUaHqEQRWqj6ON7
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-