General

  • Target

    JaffaCakes118_35378600b629ea5a5776ef8250a5b2fa

  • Size

    2.4MB

  • Sample

    241231-za23qsxqev

  • MD5

    35378600b629ea5a5776ef8250a5b2fa

  • SHA1

    7d70bf1fefa2d3e6f949d1a9a7f374f7ba0cb6e8

  • SHA256

    77cd4154f0e95ecc46fa5c01f90754d4845a4d0a231634046fc7c3ae3b82a251

  • SHA512

    5d49fc196aa3709ec6dda12c7392bdc6cd6200e626c398f297a89646b37cdcca7053596fb073c4f6e0e387ce803ab826cf1af84cf464202ef34c98772db69811

  • SSDEEP

    49152:ASqaaSWkYApTlW/7TpRrwAGurJhVvjk1XGKCC971B4RMD+3qH2HHRYpPdKnV/TZa:ASqCCApTsTp5bG4JhJjk1XP976aHGaP1

Malware Config

Targets

    • Target

      JaffaCakes118_35378600b629ea5a5776ef8250a5b2fa

    • Size

      2.4MB

    • MD5

      35378600b629ea5a5776ef8250a5b2fa

    • SHA1

      7d70bf1fefa2d3e6f949d1a9a7f374f7ba0cb6e8

    • SHA256

      77cd4154f0e95ecc46fa5c01f90754d4845a4d0a231634046fc7c3ae3b82a251

    • SHA512

      5d49fc196aa3709ec6dda12c7392bdc6cd6200e626c398f297a89646b37cdcca7053596fb073c4f6e0e387ce803ab826cf1af84cf464202ef34c98772db69811

    • SSDEEP

      49152:ASqaaSWkYApTlW/7TpRrwAGurJhVvjk1XGKCC971B4RMD+3qH2HHRYpPdKnV/TZa:ASqCCApTsTp5bG4JhJjk1XP976aHGaP1

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks