General

  • Target

    JaffaCakes118_085f3c05da921938663b00274540e93c

  • Size

    3.7MB

  • Sample

    250106-cl65hasmhw

  • MD5

    085f3c05da921938663b00274540e93c

  • SHA1

    4b743c290abbb311fb2ed8dc863d4039e73241fd

  • SHA256

    98782624d7412fb6510e54bfcbd8fdce21b2f63ebba4591bd08be892ec98e3a7

  • SHA512

    5c5218e2d6bebbcbe7c0470072717f9c5398dcdfb95db4537fd17caed06e49091de3b5427c8938fb7593c4bc075fca8b10a04a496bac93e54003df4f72c8bd3d

  • SSDEEP

    49152:/o6zVBZ/HIs48vzm0qX59ZZabt0kFjyqVKKNe0cwC:/xzF/VBLV259Pa+FqVk

Malware Config

Targets

    • Target

      JaffaCakes118_085f3c05da921938663b00274540e93c

    • Size

      3.7MB

    • MD5

      085f3c05da921938663b00274540e93c

    • SHA1

      4b743c290abbb311fb2ed8dc863d4039e73241fd

    • SHA256

      98782624d7412fb6510e54bfcbd8fdce21b2f63ebba4591bd08be892ec98e3a7

    • SHA512

      5c5218e2d6bebbcbe7c0470072717f9c5398dcdfb95db4537fd17caed06e49091de3b5427c8938fb7593c4bc075fca8b10a04a496bac93e54003df4f72c8bd3d

    • SSDEEP

      49152:/o6zVBZ/HIs48vzm0qX59ZZabt0kFjyqVKKNe0cwC:/xzF/VBLV259Pa+FqVk

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks