General

  • Target

    JaffaCakes118_195dd2089310ada6dece5a1b280b10e9

  • Size

    5.2MB

  • Sample

    241231-nzywtsyng1

  • MD5

    195dd2089310ada6dece5a1b280b10e9

  • SHA1

    e79b9b910a0220e18a2db3d2ae9cc3a59153868f

  • SHA256

    e8f0cd0d974760ceaf4831ca162a4a1664f72dc81fd2d4ff9990a37f30e47654

  • SHA512

    b8205f5a890acbd76573d44915a1b87d91a0604385ed51c4843ba28012e31123621fdc45938da82e709951f6e90bb74098c8ddcabf8845e66b47479386e96cf7

  • SSDEEP

    98304:lPlMUONNFOoSPwrfrQBaSuPJ+Edjq2IO0M/aOZi4XVSmryqbG26yrU:hlRONNFh+kcBavBHdjq2FB/vkIyi6yQ

Malware Config

Targets

    • Target

      JaffaCakes118_195dd2089310ada6dece5a1b280b10e9

    • Size

      5.2MB

    • MD5

      195dd2089310ada6dece5a1b280b10e9

    • SHA1

      e79b9b910a0220e18a2db3d2ae9cc3a59153868f

    • SHA256

      e8f0cd0d974760ceaf4831ca162a4a1664f72dc81fd2d4ff9990a37f30e47654

    • SHA512

      b8205f5a890acbd76573d44915a1b87d91a0604385ed51c4843ba28012e31123621fdc45938da82e709951f6e90bb74098c8ddcabf8845e66b47479386e96cf7

    • SSDEEP

      98304:lPlMUONNFOoSPwrfrQBaSuPJ+Edjq2IO0M/aOZi4XVSmryqbG26yrU:hlRONNFh+kcBavBHdjq2FB/vkIyi6yQ

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks