General
-
Target
JaffaCakes118_1afbd223308a0b0f6b91f78a2761776b
-
Size
17.3MB
-
Sample
241231-pjbxsszmdy
-
MD5
1afbd223308a0b0f6b91f78a2761776b
-
SHA1
12c79907889dbf3d3709630d7bdf7a434fcd9c3f
-
SHA256
0d564cec7757d6674dddf43f0feff9d31a926c7fd65396864ff170b3471f06b6
-
SHA512
6123d38466e56897c52355ddc104735ceab968bad58b24ae3b659c74efb607397c644a29ec3bccc7a656f08085487f377ef74b92baa12666ac01a2defc6bb4cf
-
SSDEEP
196608:Bc9OvKxJo/Rps2SQ19lT5MkWHxiJdO94diELmIHOL34WQU3Zu/O:2ovKxRQ1fT5MkWHxiJgEduj4g3ZuO
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1afbd223308a0b0f6b91f78a2761776b.exe
Resource
win7-20240729-en
Malware Config
Targets
-
-
Target
JaffaCakes118_1afbd223308a0b0f6b91f78a2761776b
-
Size
17.3MB
-
MD5
1afbd223308a0b0f6b91f78a2761776b
-
SHA1
12c79907889dbf3d3709630d7bdf7a434fcd9c3f
-
SHA256
0d564cec7757d6674dddf43f0feff9d31a926c7fd65396864ff170b3471f06b6
-
SHA512
6123d38466e56897c52355ddc104735ceab968bad58b24ae3b659c74efb607397c644a29ec3bccc7a656f08085487f377ef74b92baa12666ac01a2defc6bb4cf
-
SSDEEP
196608:Bc9OvKxJo/Rps2SQ19lT5MkWHxiJdO94diELmIHOL34WQU3Zu/O:2ovKxRQ1fT5MkWHxiJgEduj4g3ZuO
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-