General
-
Target
da87be7c518940be29f0a05cd638fa96_JaffaCakes118
-
Size
527KB
-
Sample
240911-rmjg6avgqa
-
MD5
da87be7c518940be29f0a05cd638fa96
-
SHA1
1bebaf2f4f297ff17cd10889be08b877a4571977
-
SHA256
135d3087600b1b4b3a3589dedf30006d3262de65a5e11fa942df9cb86c04ade2
-
SHA512
1dac68b2b4f7bff67c9d34afb45afff645322e0c81e455e0268bae4dd4d8a652ab8fc4c3727b06fa2b160a13b941cbe6078de89f620e52ae21d2ca5794550c00
-
SSDEEP
12288:y/22VQQsmkV60DYGVkvecPcCb9Mdb+j6Y0akY1jX/a4GaqqW00H5:y/2NNf60sM1nB+Bvt/PoqW00Z
Static task
static1
Behavioral task
behavioral1
Sample
da87be7c518940be29f0a05cd638fa96_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
13.4
517
http://hotsalegnom.com/
-
profile_id
517
Targets
-
-
Target
da87be7c518940be29f0a05cd638fa96_JaffaCakes118
-
Size
527KB
-
MD5
da87be7c518940be29f0a05cd638fa96
-
SHA1
1bebaf2f4f297ff17cd10889be08b877a4571977
-
SHA256
135d3087600b1b4b3a3589dedf30006d3262de65a5e11fa942df9cb86c04ade2
-
SHA512
1dac68b2b4f7bff67c9d34afb45afff645322e0c81e455e0268bae4dd4d8a652ab8fc4c3727b06fa2b160a13b941cbe6078de89f620e52ae21d2ca5794550c00
-
SSDEEP
12288:y/22VQQsmkV60DYGVkvecPcCb9Mdb+j6Y0akY1jX/a4GaqqW00H5:y/2NNf60sM1nB+Bvt/PoqW00Z
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Vidar Stealer
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-