General

  • Target

    JaffaCakes118_7777703020a76330b89b453ffd37a3c6

  • Size

    2.9MB

  • Sample

    250104-efwspasnbr

  • MD5

    7777703020a76330b89b453ffd37a3c6

  • SHA1

    35a77fdfdf7424c3e774b6ea86a581363b884d07

  • SHA256

    73b260bd596dba9a66f71109028bad12dfac35a889b55698fdf79ca943271e16

  • SHA512

    6b52e4278d1df502b55a174d121197476db04efde6392f9f8ea0b43657f4028fbbfc8c6ca30af79449c1e006ab11f534b1fa67cfb8bc3c3c8bb894837088e818

  • SSDEEP

    49152:oxZWPC1nKPnX1bnnpfrvjbW7j1NCEA0wlqpsMU0gn4ZgOB4x+CQ:oDYC1i1bpTe7jq90MquM/g4Zgs4u

Malware Config

Targets

    • Target

      JaffaCakes118_7777703020a76330b89b453ffd37a3c6

    • Size

      2.9MB

    • MD5

      7777703020a76330b89b453ffd37a3c6

    • SHA1

      35a77fdfdf7424c3e774b6ea86a581363b884d07

    • SHA256

      73b260bd596dba9a66f71109028bad12dfac35a889b55698fdf79ca943271e16

    • SHA512

      6b52e4278d1df502b55a174d121197476db04efde6392f9f8ea0b43657f4028fbbfc8c6ca30af79449c1e006ab11f534b1fa67cfb8bc3c3c8bb894837088e818

    • SSDEEP

      49152:oxZWPC1nKPnX1bnnpfrvjbW7j1NCEA0wlqpsMU0gn4ZgOB4x+CQ:oDYC1i1bpTe7jq90MquM/g4Zgs4u

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks