General
-
Target
JaffaCakes118_085f3c05da921938663b00274540e93c
-
Size
3.7MB
-
Sample
250106-cl65hasmhw
-
MD5
085f3c05da921938663b00274540e93c
-
SHA1
4b743c290abbb311fb2ed8dc863d4039e73241fd
-
SHA256
98782624d7412fb6510e54bfcbd8fdce21b2f63ebba4591bd08be892ec98e3a7
-
SHA512
5c5218e2d6bebbcbe7c0470072717f9c5398dcdfb95db4537fd17caed06e49091de3b5427c8938fb7593c4bc075fca8b10a04a496bac93e54003df4f72c8bd3d
-
SSDEEP
49152:/o6zVBZ/HIs48vzm0qX59ZZabt0kFjyqVKKNe0cwC:/xzF/VBLV259Pa+FqVk
Behavioral task
behavioral1
Sample
JaffaCakes118_085f3c05da921938663b00274540e93c.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_085f3c05da921938663b00274540e93c
-
Size
3.7MB
-
MD5
085f3c05da921938663b00274540e93c
-
SHA1
4b743c290abbb311fb2ed8dc863d4039e73241fd
-
SHA256
98782624d7412fb6510e54bfcbd8fdce21b2f63ebba4591bd08be892ec98e3a7
-
SHA512
5c5218e2d6bebbcbe7c0470072717f9c5398dcdfb95db4537fd17caed06e49091de3b5427c8938fb7593c4bc075fca8b10a04a496bac93e54003df4f72c8bd3d
-
SSDEEP
49152:/o6zVBZ/HIs48vzm0qX59ZZabt0kFjyqVKKNe0cwC:/xzF/VBLV259Pa+FqVk
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-