General
-
Target
b0c8bd4c3d747e84bd46e8d5167b9263_JaffaCakes118
-
Size
467KB
-
Sample
240615-3zmacstgrk
-
MD5
b0c8bd4c3d747e84bd46e8d5167b9263
-
SHA1
b9b925625bb047dc7a39978bd2c4f70160452b47
-
SHA256
223ebb84039eb0a3bb87f74bd35e5bd065c3cb508f381f085f9b43d33fc497a1
-
SHA512
abca53391d8067f565f1b80e3e550a1d4709abc509c377a1486ec2481cbcf14539782abb88b5a461374f18d5b2b2cd81b2f0acb245755451503e6d34ec06675e
-
SSDEEP
12288:mSwV/kMfszWNDSUZx8m5wyhcvBpXCXX+VaQj:9mcMDDSUZem5ADau
Static task
static1
Behavioral task
behavioral1
Sample
b0c8bd4c3d747e84bd46e8d5167b9263_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
vidar
31.8
517
http://resortbooking.ac.ug/
-
profile_id
517
Targets
-
-
Target
b0c8bd4c3d747e84bd46e8d5167b9263_JaffaCakes118
-
Size
467KB
-
MD5
b0c8bd4c3d747e84bd46e8d5167b9263
-
SHA1
b9b925625bb047dc7a39978bd2c4f70160452b47
-
SHA256
223ebb84039eb0a3bb87f74bd35e5bd065c3cb508f381f085f9b43d33fc497a1
-
SHA512
abca53391d8067f565f1b80e3e550a1d4709abc509c377a1486ec2481cbcf14539782abb88b5a461374f18d5b2b2cd81b2f0acb245755451503e6d34ec06675e
-
SSDEEP
12288:mSwV/kMfszWNDSUZx8m5wyhcvBpXCXX+VaQj:9mcMDDSUZem5ADau
-
Vidar Stealer
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-