General
-
Target
JaffaCakes118_799be8bbf49210032ced86a8087bca48
-
Size
3.0MB
-
Sample
250107-z2hs6synbt
-
MD5
799be8bbf49210032ced86a8087bca48
-
SHA1
f1fe555fa4787d0cf9aa8af51a3a34ee248b73ea
-
SHA256
45ff89164b2c321fa8c388e665e65439ad0ffac509a58c81ea89e3f767494529
-
SHA512
c59d4b513a388dcb5fe196bd34e6e2c7bdc857e2ba457e532ff7df9d5232e353a6c76db332ec9b11a8661ed7015e8f56c9fc9107f2e5e5cede2ca6845bca832a
-
SSDEEP
49152:DOEUkNjzbfycB4elcaLjp2SbQbNflcdIHzj5jRn7ZrtPtAbxnO7ZovEf6:6NkFzgRMFiNfKIf597ZrjAbZYUZ
Behavioral task
behavioral1
Sample
JaffaCakes118_799be8bbf49210032ced86a8087bca48.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
JaffaCakes118_799be8bbf49210032ced86a8087bca48
-
Size
3.0MB
-
MD5
799be8bbf49210032ced86a8087bca48
-
SHA1
f1fe555fa4787d0cf9aa8af51a3a34ee248b73ea
-
SHA256
45ff89164b2c321fa8c388e665e65439ad0ffac509a58c81ea89e3f767494529
-
SHA512
c59d4b513a388dcb5fe196bd34e6e2c7bdc857e2ba457e532ff7df9d5232e353a6c76db332ec9b11a8661ed7015e8f56c9fc9107f2e5e5cede2ca6845bca832a
-
SSDEEP
49152:DOEUkNjzbfycB4elcaLjp2SbQbNflcdIHzj5jRn7ZrtPtAbxnO7ZovEf6:6NkFzgRMFiNfKIf597ZrjAbZYUZ
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-