General
-
Target
3483cff0c6e4ed4aaf95b87d25a958a2_JaffaCakes118
-
Size
873KB
-
Sample
240330-f1dchsab63
-
MD5
3483cff0c6e4ed4aaf95b87d25a958a2
-
SHA1
75171964a113cad2260d5b2f6da4e448123ecaff
-
SHA256
f3d01fc1bdbf7f5fbd7fc1cfbaf67a2fef6bda844abcff774f7abae50d6016a1
-
SHA512
7ed5cd8936652ea6b1646acef688c4b3c35d2104668e74d0b807f9b00b9ac44e34d344e33f63ecffdc52bc4b6c5bb88a0cd17554360480a03c494f69e033fa81
-
SSDEEP
12288:cLxhqCrfU7SAVbjw5TkS/DhFYb2+56uiLuxMcSAZ1TjVpYX6fAZiQL7u3Yyf39c2:c1hHrg6/DjuieqAv9Qiy7u3Y23ejS
Static task
static1
Behavioral task
behavioral1
Sample
3483cff0c6e4ed4aaf95b87d25a958a2_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
vidar
41.2
517
https://mas.to/@serg4325
-
profile_id
517
Targets
-
-
Target
3483cff0c6e4ed4aaf95b87d25a958a2_JaffaCakes118
-
Size
873KB
-
MD5
3483cff0c6e4ed4aaf95b87d25a958a2
-
SHA1
75171964a113cad2260d5b2f6da4e448123ecaff
-
SHA256
f3d01fc1bdbf7f5fbd7fc1cfbaf67a2fef6bda844abcff774f7abae50d6016a1
-
SHA512
7ed5cd8936652ea6b1646acef688c4b3c35d2104668e74d0b807f9b00b9ac44e34d344e33f63ecffdc52bc4b6c5bb88a0cd17554360480a03c494f69e033fa81
-
SSDEEP
12288:cLxhqCrfU7SAVbjw5TkS/DhFYb2+56uiLuxMcSAZ1TjVpYX6fAZiQL7u3Yyf39c2:c1hHrg6/DjuieqAv9Qiy7u3Y23ejS
-
Vidar Stealer
-
Suspicious use of SetThreadContext
-