General
-
Target
JaffaCakes118_28cb1b27ba59327cb63b98374310cb15
-
Size
1.9MB
-
Sample
241231-t5zm7syqdz
-
MD5
28cb1b27ba59327cb63b98374310cb15
-
SHA1
12bc50238c6f0974c70f91d50f9a380a61d81d63
-
SHA256
4c53160d026ec1723dd5178ff5ae31d194dd96d9264d8047bf28e9ee27dab183
-
SHA512
5cae9beffd22215ad9489bda2d742ed47b8cad6a3d14ba79b20dc7024bde2faa881887163e10661e556fc90b2455209a59a214da5a74077b582450b4fbd5fdf5
-
SSDEEP
24576:JQgPK5BP+BoCLxjJr8/4vLudZ4UnDRIXnO+THFVli5kmIkYXBInLjo/Tq1i3RfJB:JQgPKbY0/qmZ4Und6DkmmIkQz/TqGCuT
Behavioral task
behavioral1
Sample
JaffaCakes118_28cb1b27ba59327cb63b98374310cb15.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_28cb1b27ba59327cb63b98374310cb15
-
Size
1.9MB
-
MD5
28cb1b27ba59327cb63b98374310cb15
-
SHA1
12bc50238c6f0974c70f91d50f9a380a61d81d63
-
SHA256
4c53160d026ec1723dd5178ff5ae31d194dd96d9264d8047bf28e9ee27dab183
-
SHA512
5cae9beffd22215ad9489bda2d742ed47b8cad6a3d14ba79b20dc7024bde2faa881887163e10661e556fc90b2455209a59a214da5a74077b582450b4fbd5fdf5
-
SSDEEP
24576:JQgPK5BP+BoCLxjJr8/4vLudZ4UnDRIXnO+THFVli5kmIkYXBInLjo/Tq1i3RfJB:JQgPKbY0/qmZ4Und6DkmmIkQz/TqGCuT
-
Raccoon Stealer V1 payload
-
Raccoon family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-