General

  • Target

    JaffaCakes118_af2527562aad6ca86955d42b76ec4c7c

  • Size

    5.5MB

  • Sample

    250108-1z76qaxqhl

  • MD5

    af2527562aad6ca86955d42b76ec4c7c

  • SHA1

    79bbeb888f108433cfec2be28fe95646140a8cae

  • SHA256

    665a2195fb5888b79919c4fef6c27927b9d4edce6548ee623c2b08a3567ec0fe

  • SHA512

    d3b17912ef7c72f91486ff69bda857641e1b6cefdcc55fe09470df7f33fcee259a5db6ddf977e5fac4d5ab7b7ecb91f8ef1837091ad2589a77c79767e6bbd318

  • SSDEEP

    98304:OYHaC0HIV5Wy7DNx8k744bmrnJwXt3gZy9PupcdifOMTdppkJRvMi4uF7I:0CLfP78u4omrJwd3Iefib2Maq

Malware Config

Targets

    • Target

      JaffaCakes118_af2527562aad6ca86955d42b76ec4c7c

    • Size

      5.5MB

    • MD5

      af2527562aad6ca86955d42b76ec4c7c

    • SHA1

      79bbeb888f108433cfec2be28fe95646140a8cae

    • SHA256

      665a2195fb5888b79919c4fef6c27927b9d4edce6548ee623c2b08a3567ec0fe

    • SHA512

      d3b17912ef7c72f91486ff69bda857641e1b6cefdcc55fe09470df7f33fcee259a5db6ddf977e5fac4d5ab7b7ecb91f8ef1837091ad2589a77c79767e6bbd318

    • SSDEEP

      98304:OYHaC0HIV5Wy7DNx8k744bmrnJwXt3gZy9PupcdifOMTdppkJRvMi4uF7I:0CLfP78u4omrJwd3Iefib2Maq

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks