General

  • Target

    JaffaCakes118_d8b030746063b1961c69db82fce4c652

  • Size

    2.5MB

  • Sample

    250110-c4kn8ayqdw

  • MD5

    d8b030746063b1961c69db82fce4c652

  • SHA1

    349d4e95c35bf3dfd8bfb2560dedd2f3260c9f33

  • SHA256

    ef17a3d0db73f728d2793c6204ab2c7871c5e50d803b8a1670611b0ef70e7b0a

  • SHA512

    a03943cff08a258525878180104d9f401d7b77475cf412fc624955a10692fd37741030651eb3d70a8d272a7851672dd6b6e19a2d7a44363f99555d4b16cc0449

  • SSDEEP

    49152:mkOOXZtdUvZkxwRwRBhXFt1k1M4QQr9u3vj+d4CI4fs2s/BG8bQhMQAGms:mkHxU/Rwzh//4/eyK202sg8Uabs

Malware Config

Targets

    • Target

      JaffaCakes118_d8b030746063b1961c69db82fce4c652

    • Size

      2.5MB

    • MD5

      d8b030746063b1961c69db82fce4c652

    • SHA1

      349d4e95c35bf3dfd8bfb2560dedd2f3260c9f33

    • SHA256

      ef17a3d0db73f728d2793c6204ab2c7871c5e50d803b8a1670611b0ef70e7b0a

    • SHA512

      a03943cff08a258525878180104d9f401d7b77475cf412fc624955a10692fd37741030651eb3d70a8d272a7851672dd6b6e19a2d7a44363f99555d4b16cc0449

    • SSDEEP

      49152:mkOOXZtdUvZkxwRwRBhXFt1k1M4QQr9u3vj+d4CI4fs2s/BG8bQhMQAGms:mkHxU/Rwzh//4/eyK202sg8Uabs

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Warzone RAT payload

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks