General

  • Target

    JaffaCakes118_1afbd223308a0b0f6b91f78a2761776b

  • Size

    17.3MB

  • Sample

    241231-pjbxsszmdy

  • MD5

    1afbd223308a0b0f6b91f78a2761776b

  • SHA1

    12c79907889dbf3d3709630d7bdf7a434fcd9c3f

  • SHA256

    0d564cec7757d6674dddf43f0feff9d31a926c7fd65396864ff170b3471f06b6

  • SHA512

    6123d38466e56897c52355ddc104735ceab968bad58b24ae3b659c74efb607397c644a29ec3bccc7a656f08085487f377ef74b92baa12666ac01a2defc6bb4cf

  • SSDEEP

    196608:Bc9OvKxJo/Rps2SQ19lT5MkWHxiJdO94diELmIHOL34WQU3Zu/O:2ovKxRQ1fT5MkWHxiJgEduj4g3ZuO

Malware Config

Targets

    • Target

      JaffaCakes118_1afbd223308a0b0f6b91f78a2761776b

    • Size

      17.3MB

    • MD5

      1afbd223308a0b0f6b91f78a2761776b

    • SHA1

      12c79907889dbf3d3709630d7bdf7a434fcd9c3f

    • SHA256

      0d564cec7757d6674dddf43f0feff9d31a926c7fd65396864ff170b3471f06b6

    • SHA512

      6123d38466e56897c52355ddc104735ceab968bad58b24ae3b659c74efb607397c644a29ec3bccc7a656f08085487f377ef74b92baa12666ac01a2defc6bb4cf

    • SSDEEP

      196608:Bc9OvKxJo/Rps2SQ19lT5MkWHxiJdO94diELmIHOL34WQU3Zu/O:2ovKxRQ1fT5MkWHxiJgEduj4g3ZuO

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks