General
-
Target
JaffaCakes118_e46c55a543092797f9f3395240b0d722
-
Size
1.7MB
-
Sample
250211-ka134s1lan
-
MD5
e46c55a543092797f9f3395240b0d722
-
SHA1
c42485b4bde8ddb0502f53ec0e95c9592ebc4db0
-
SHA256
98bbc616347efeefb3172d20cfcbcf542a1ada7f0665bc970196ae6607bcff23
-
SHA512
4b362599075dc40b212a4988628c62f2a82223ca16d0a6415340e304a2a380383669487f12a088e05a26ff79d8e8fc0f580c76c942cad7be6d4ea26f263551c9
-
SSDEEP
49152:n6VP9rFuM6zG89WDU49bNgl8unxDpYYp1HzCcpg:6DrVLF9ba/nxmIzC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e46c55a543092797f9f3395240b0d722.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
JaffaCakes118_e46c55a543092797f9f3395240b0d722
-
Size
1.7MB
-
MD5
e46c55a543092797f9f3395240b0d722
-
SHA1
c42485b4bde8ddb0502f53ec0e95c9592ebc4db0
-
SHA256
98bbc616347efeefb3172d20cfcbcf542a1ada7f0665bc970196ae6607bcff23
-
SHA512
4b362599075dc40b212a4988628c62f2a82223ca16d0a6415340e304a2a380383669487f12a088e05a26ff79d8e8fc0f580c76c942cad7be6d4ea26f263551c9
-
SSDEEP
49152:n6VP9rFuM6zG89WDU49bNgl8unxDpYYp1HzCcpg:6DrVLF9ba/nxmIzC
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1