General
-
Target
f9e6e88eb092ccd7e4b8626cba905657_JaffaCakes118
-
Size
1.3MB
-
Sample
240419-karvfacg52
-
MD5
f9e6e88eb092ccd7e4b8626cba905657
-
SHA1
5fc08c1200531073b5484dd40f72c9c6c651f748
-
SHA256
98ee19dbbe959081f2d95b7f56af58fcb7ecdc5b85bb9ee13775376b9bad1ccf
-
SHA512
e399ac991b643f7ae3264c71cfc3e20eeff52adb53e5c6b12fee6c29d6e4523bc768553883ec6767811a2bf1744cb2773b4c804a9ee7c9c163274ecfa109fa74
-
SSDEEP
24576:gkm3mx4M9UspHfj3K5Q51QB0sm16SpB7opewH5Iz6Bm/9Tyarl0yZ5MtkZb:Emx4QpD00cSr83Cz/xyolpZ
Static task
static1
Behavioral task
behavioral1
Sample
f9e6e88eb092ccd7e4b8626cba905657_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
vidar
41.3
921
https://mas.to/@oleg98
-
profile_id
921
Targets
-
-
Target
f9e6e88eb092ccd7e4b8626cba905657_JaffaCakes118
-
Size
1.3MB
-
MD5
f9e6e88eb092ccd7e4b8626cba905657
-
SHA1
5fc08c1200531073b5484dd40f72c9c6c651f748
-
SHA256
98ee19dbbe959081f2d95b7f56af58fcb7ecdc5b85bb9ee13775376b9bad1ccf
-
SHA512
e399ac991b643f7ae3264c71cfc3e20eeff52adb53e5c6b12fee6c29d6e4523bc768553883ec6767811a2bf1744cb2773b4c804a9ee7c9c163274ecfa109fa74
-
SSDEEP
24576:gkm3mx4M9UspHfj3K5Q51QB0sm16SpB7opewH5Iz6Bm/9Tyarl0yZ5MtkZb:Emx4QpD00cSr83Cz/xyolpZ
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Vidar Stealer
-
Suspicious use of SetThreadContext
-