General

  • Target

    JaffaCakes118_c8c5318e55ef91f7566c585d0157cc90

  • Size

    3.0MB

  • Sample

    250109-p9qhwazqey

  • MD5

    c8c5318e55ef91f7566c585d0157cc90

  • SHA1

    0e9f001f523bb2938dbe6c0b547faca932b31697

  • SHA256

    8e00c11c54f5c2aab457920120ed02205299d4341975b073b4841b749b0e47a0

  • SHA512

    74831484ad84315bdd54359edde898ecc9427b169f038f199c37124ab35375890418bdab207c21ca84de157a84b05850aaab2bf8049b72b7c519580399d636a9

  • SSDEEP

    49152:oONykdwTu98f1sO2xtqkvRId4vP2DRYlpPncdugvXtO9zUqu6ZJtc+wTrjBDkiQR:B/wqGaxZRlWRYlpovvXMzBLZJtc7Trlw

Malware Config

Targets

    • Target

      JaffaCakes118_c8c5318e55ef91f7566c585d0157cc90

    • Size

      3.0MB

    • MD5

      c8c5318e55ef91f7566c585d0157cc90

    • SHA1

      0e9f001f523bb2938dbe6c0b547faca932b31697

    • SHA256

      8e00c11c54f5c2aab457920120ed02205299d4341975b073b4841b749b0e47a0

    • SHA512

      74831484ad84315bdd54359edde898ecc9427b169f038f199c37124ab35375890418bdab207c21ca84de157a84b05850aaab2bf8049b72b7c519580399d636a9

    • SSDEEP

      49152:oONykdwTu98f1sO2xtqkvRId4vP2DRYlpPncdugvXtO9zUqu6ZJtc+wTrjBDkiQR:B/wqGaxZRlWRYlpovvXMzBLZJtc7Trlw

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks