General
-
Target
JaffaCakes118_195dd2089310ada6dece5a1b280b10e9
-
Size
5.2MB
-
Sample
241231-nzywtsyng1
-
MD5
195dd2089310ada6dece5a1b280b10e9
-
SHA1
e79b9b910a0220e18a2db3d2ae9cc3a59153868f
-
SHA256
e8f0cd0d974760ceaf4831ca162a4a1664f72dc81fd2d4ff9990a37f30e47654
-
SHA512
b8205f5a890acbd76573d44915a1b87d91a0604385ed51c4843ba28012e31123621fdc45938da82e709951f6e90bb74098c8ddcabf8845e66b47479386e96cf7
-
SSDEEP
98304:lPlMUONNFOoSPwrfrQBaSuPJ+Edjq2IO0M/aOZi4XVSmryqbG26yrU:hlRONNFh+kcBavBHdjq2FB/vkIyi6yQ
Behavioral task
behavioral1
Sample
JaffaCakes118_195dd2089310ada6dece5a1b280b10e9.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
JaffaCakes118_195dd2089310ada6dece5a1b280b10e9
-
Size
5.2MB
-
MD5
195dd2089310ada6dece5a1b280b10e9
-
SHA1
e79b9b910a0220e18a2db3d2ae9cc3a59153868f
-
SHA256
e8f0cd0d974760ceaf4831ca162a4a1664f72dc81fd2d4ff9990a37f30e47654
-
SHA512
b8205f5a890acbd76573d44915a1b87d91a0604385ed51c4843ba28012e31123621fdc45938da82e709951f6e90bb74098c8ddcabf8845e66b47479386e96cf7
-
SSDEEP
98304:lPlMUONNFOoSPwrfrQBaSuPJ+Edjq2IO0M/aOZi4XVSmryqbG26yrU:hlRONNFh+kcBavBHdjq2FB/vkIyi6yQ
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-