General

  • Target

    JaffaCakes118_f36dce77ea4480e95d763db6c31b033e

  • Size

    2.3MB

  • Sample

    250111-bxcjlazkgn

  • MD5

    f36dce77ea4480e95d763db6c31b033e

  • SHA1

    2a1e2d46856aae304dc7703efd7b3425437cbeeb

  • SHA256

    4da051820aa16c3258fa1b3c276a42df4f5a6006ce820ae26bc0bcc3a3fef3a7

  • SHA512

    ecf209722550ab1e1505ae01823414a70bbc3125a4d5a9611c0eeae60472d1189f6dcc8f70a7afb5347fcf18dafdc9d52d6ebe6acc06bbadcb58ca84e448707c

  • SSDEEP

    49152:ng1296HTCVMxIDQeYBBUlwbqR2xQOD0d9dJwGlUa1GmbiyKUumFoT51R:nYCV9DQe692DOY9dGGlUaBKJmFW1R

Malware Config

Targets

    • Target

      JaffaCakes118_f36dce77ea4480e95d763db6c31b033e

    • Size

      2.3MB

    • MD5

      f36dce77ea4480e95d763db6c31b033e

    • SHA1

      2a1e2d46856aae304dc7703efd7b3425437cbeeb

    • SHA256

      4da051820aa16c3258fa1b3c276a42df4f5a6006ce820ae26bc0bcc3a3fef3a7

    • SHA512

      ecf209722550ab1e1505ae01823414a70bbc3125a4d5a9611c0eeae60472d1189f6dcc8f70a7afb5347fcf18dafdc9d52d6ebe6acc06bbadcb58ca84e448707c

    • SSDEEP

      49152:ng1296HTCVMxIDQeYBBUlwbqR2xQOD0d9dJwGlUa1GmbiyKUumFoT51R:nYCV9DQe692DOY9dGGlUaBKJmFW1R

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks