General

  • Target

    JaffaCakes118_799be8bbf49210032ced86a8087bca48

  • Size

    3.0MB

  • Sample

    250107-z2hs6synbt

  • MD5

    799be8bbf49210032ced86a8087bca48

  • SHA1

    f1fe555fa4787d0cf9aa8af51a3a34ee248b73ea

  • SHA256

    45ff89164b2c321fa8c388e665e65439ad0ffac509a58c81ea89e3f767494529

  • SHA512

    c59d4b513a388dcb5fe196bd34e6e2c7bdc857e2ba457e532ff7df9d5232e353a6c76db332ec9b11a8661ed7015e8f56c9fc9107f2e5e5cede2ca6845bca832a

  • SSDEEP

    49152:DOEUkNjzbfycB4elcaLjp2SbQbNflcdIHzj5jRn7ZrtPtAbxnO7ZovEf6:6NkFzgRMFiNfKIf597ZrjAbZYUZ

Malware Config

Targets

    • Target

      JaffaCakes118_799be8bbf49210032ced86a8087bca48

    • Size

      3.0MB

    • MD5

      799be8bbf49210032ced86a8087bca48

    • SHA1

      f1fe555fa4787d0cf9aa8af51a3a34ee248b73ea

    • SHA256

      45ff89164b2c321fa8c388e665e65439ad0ffac509a58c81ea89e3f767494529

    • SHA512

      c59d4b513a388dcb5fe196bd34e6e2c7bdc857e2ba457e532ff7df9d5232e353a6c76db332ec9b11a8661ed7015e8f56c9fc9107f2e5e5cede2ca6845bca832a

    • SSDEEP

      49152:DOEUkNjzbfycB4elcaLjp2SbQbNflcdIHzj5jRn7ZrtPtAbxnO7ZovEf6:6NkFzgRMFiNfKIf597ZrjAbZYUZ

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks