General
-
Target
d494477460b26ffbbd75a1e62b0f243e_JaffaCakes118
-
Size
1.5MB
-
Sample
240908-ryjbjatdmc
-
MD5
d494477460b26ffbbd75a1e62b0f243e
-
SHA1
484e46737ae1919047a32126a5423ec1f563bc5f
-
SHA256
8f95ae5e5e774a322e272b430e09bbe7790ab8c57a804e07a053d489f48c8979
-
SHA512
bca9b9235cf0796352f6f8847d176b613e1421367af677281df306bdab19f241a9bfe77749e3dc5178008767b8cb5cb4a8ed8702119b1d5e616605e293691d3c
-
SSDEEP
24576:/obJrTrxaXKm0DDkXOSFcZekxcLxYCNc+mOw+RvVXk6ZsId:gtrTsXXQDkXOSFcZe1KR+vXE
Behavioral task
behavioral1
Sample
d494477460b26ffbbd75a1e62b0f243e_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
41.1
921
https://mas.to/@bardak1ho
-
profile_id
921
Targets
-
-
Target
d494477460b26ffbbd75a1e62b0f243e_JaffaCakes118
-
Size
1.5MB
-
MD5
d494477460b26ffbbd75a1e62b0f243e
-
SHA1
484e46737ae1919047a32126a5423ec1f563bc5f
-
SHA256
8f95ae5e5e774a322e272b430e09bbe7790ab8c57a804e07a053d489f48c8979
-
SHA512
bca9b9235cf0796352f6f8847d176b613e1421367af677281df306bdab19f241a9bfe77749e3dc5178008767b8cb5cb4a8ed8702119b1d5e616605e293691d3c
-
SSDEEP
24576:/obJrTrxaXKm0DDkXOSFcZekxcLxYCNc+mOw+RvVXk6ZsId:gtrTsXXQDkXOSFcZe1KR+vXE
-
Vidar Stealer
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of SetThreadContext
-