General
-
Target
06b5e8e5108f700f733f029529489055_JaffaCakes118
-
Size
3.4MB
-
Sample
241001-vxf2ka1fkj
-
MD5
06b5e8e5108f700f733f029529489055
-
SHA1
b36f6095b70c58a7f269e4561056b85a564dd3d1
-
SHA256
b255f6b269f178c5f63162e16c830cfc772e80ad18b50b62dbe7c5da156b3980
-
SHA512
06f72e584d6c76ca939dd27dfcda66a01914129cfa8bc86ab36ab72f836523294f0b30b8d64a8016d25e52b5393d80a4dc77eacbe662ab65d21851809730001a
-
SSDEEP
98304:x018QQd1K6KU/ctlh1OEFVPSTCvLUBsKa3:xk8QQfK6ZYlh1XVPTLUCKC
Static task
static1
Behavioral task
behavioral1
Sample
06b5e8e5108f700f733f029529489055_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
nullmixer
http://razino.xyz/
Extracted
vidar
39.4
706
https://sergeevih43.tumblr.com/
-
profile_id
706
Targets
-
-
Target
06b5e8e5108f700f733f029529489055_JaffaCakes118
-
Size
3.4MB
-
MD5
06b5e8e5108f700f733f029529489055
-
SHA1
b36f6095b70c58a7f269e4561056b85a564dd3d1
-
SHA256
b255f6b269f178c5f63162e16c830cfc772e80ad18b50b62dbe7c5da156b3980
-
SHA512
06f72e584d6c76ca939dd27dfcda66a01914129cfa8bc86ab36ab72f836523294f0b30b8d64a8016d25e52b5393d80a4dc77eacbe662ab65d21851809730001a
-
SSDEEP
98304:x018QQd1K6KU/ctlh1OEFVPSTCvLUBsKa3:xk8QQfK6ZYlh1XVPTLUCKC
-
Detect Fabookie payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Vidar Stealer
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1