General

  • Target

    f7b394a8bc50dadfa41a243e5c9dacb7_JaffaCakes118

  • Size

    5.4MB

  • Sample

    241216-g2y62sxqfw

  • MD5

    f7b394a8bc50dadfa41a243e5c9dacb7

  • SHA1

    c8d02c4c38fcd761824b8dd690c5497bca2049bd

  • SHA256

    5bc81daaa66b1f8bdf92103ba33d416da10a19304d83bbc6210c52320ed2a889

  • SHA512

    de60604c11f27b647d3844a81861c117f6ed6eca53d8c72644011c532080cc4f36b43ad945b427ab2ef199ec676c6c20b4a43ba5a36301c4466666dd5a002fcc

  • SSDEEP

    98304:SpNz/yAfY7LpoNKavfAlidC06HsxY8MICTEQR+NqrH6GrflwC3B:GYLK8qfpUaHqEQRWqj6ON7

Malware Config

Targets

    • Target

      f7b394a8bc50dadfa41a243e5c9dacb7_JaffaCakes118

    • Size

      5.4MB

    • MD5

      f7b394a8bc50dadfa41a243e5c9dacb7

    • SHA1

      c8d02c4c38fcd761824b8dd690c5497bca2049bd

    • SHA256

      5bc81daaa66b1f8bdf92103ba33d416da10a19304d83bbc6210c52320ed2a889

    • SHA512

      de60604c11f27b647d3844a81861c117f6ed6eca53d8c72644011c532080cc4f36b43ad945b427ab2ef199ec676c6c20b4a43ba5a36301c4466666dd5a002fcc

    • SSDEEP

      98304:SpNz/yAfY7LpoNKavfAlidC06HsxY8MICTEQR+NqrH6GrflwC3B:GYLK8qfpUaHqEQRWqj6ON7

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks