General

  • Target

    f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118

  • Size

    1.2MB

  • Sample

    240925-ljpbca1dje

  • MD5

    f5b693e65bb05bd6916e29cbb1adb1cc

  • SHA1

    8ed9365deb17627a4d5ff4fb5a1467c8beab2031

  • SHA256

    3dd24bfc6728959f084de536645e2bd20318e4a709b41cddb9245147922da1d0

  • SHA512

    df8444288514c3da117ba5115ca357851af7ecdea8d73299a944a0694ffb7de57b39cee92fc827c994b550de58089316df5c5bcc5c96c43178dc5f57c6e0bf68

  • SSDEEP

    24576:oaPADnvDHtyGnOJlIqeJC6e0ZVmPGZK40Nx1O97P6iaSVVu1kqE27:iDnrHIGnulIJC6L4uZf0D1BuV+EI

Malware Config

Extracted

Family

vidar

Version

24

Botnet

93

C2

http://wrangellse.com/

Attributes
  • profile_id

    93

Targets

    • Target

      f5b693e65bb05bd6916e29cbb1adb1cc_JaffaCakes118

    • Size

      1.2MB

    • MD5

      f5b693e65bb05bd6916e29cbb1adb1cc

    • SHA1

      8ed9365deb17627a4d5ff4fb5a1467c8beab2031

    • SHA256

      3dd24bfc6728959f084de536645e2bd20318e4a709b41cddb9245147922da1d0

    • SHA512

      df8444288514c3da117ba5115ca357851af7ecdea8d73299a944a0694ffb7de57b39cee92fc827c994b550de58089316df5c5bcc5c96c43178dc5f57c6e0bf68

    • SSDEEP

      24576:oaPADnvDHtyGnOJlIqeJC6e0ZVmPGZK40Nx1O97P6iaSVVu1kqE27:iDnrHIGnulIJC6L4uZf0D1BuV+EI

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar Stealer

    • Manipulates Digital Signatures

      Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses 2FA software files, possible credential harvesting

    • Deobfuscate/Decode Files or Information

      Payload decoded via CertUtil.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks