General
-
Target
JaffaCakes118_7777703020a76330b89b453ffd37a3c6
-
Size
2.9MB
-
Sample
250104-efwspasnbr
-
MD5
7777703020a76330b89b453ffd37a3c6
-
SHA1
35a77fdfdf7424c3e774b6ea86a581363b884d07
-
SHA256
73b260bd596dba9a66f71109028bad12dfac35a889b55698fdf79ca943271e16
-
SHA512
6b52e4278d1df502b55a174d121197476db04efde6392f9f8ea0b43657f4028fbbfc8c6ca30af79449c1e006ab11f534b1fa67cfb8bc3c3c8bb894837088e818
-
SSDEEP
49152:oxZWPC1nKPnX1bnnpfrvjbW7j1NCEA0wlqpsMU0gn4ZgOB4x+CQ:oDYC1i1bpTe7jq90MquM/g4Zgs4u
Behavioral task
behavioral1
Sample
JaffaCakes118_7777703020a76330b89b453ffd37a3c6.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
JaffaCakes118_7777703020a76330b89b453ffd37a3c6
-
Size
2.9MB
-
MD5
7777703020a76330b89b453ffd37a3c6
-
SHA1
35a77fdfdf7424c3e774b6ea86a581363b884d07
-
SHA256
73b260bd596dba9a66f71109028bad12dfac35a889b55698fdf79ca943271e16
-
SHA512
6b52e4278d1df502b55a174d121197476db04efde6392f9f8ea0b43657f4028fbbfc8c6ca30af79449c1e006ab11f534b1fa67cfb8bc3c3c8bb894837088e818
-
SSDEEP
49152:oxZWPC1nKPnX1bnnpfrvjbW7j1NCEA0wlqpsMU0gn4ZgOB4x+CQ:oDYC1i1bpTe7jq90MquM/g4Zgs4u
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-