General
-
Target
c513c1da60b31eaa8b46870f9f0e29ff_JaffaCakes118
-
Size
1.4MB
-
Sample
241205-az927syrdt
-
MD5
c513c1da60b31eaa8b46870f9f0e29ff
-
SHA1
b564919aeb814216d09f6a79221efcf7a22de7b6
-
SHA256
a2ac6fd6156acf555c5eabc6a1bd33d03f6d569ae5a9485c6c6619d6292fde01
-
SHA512
13f1d7ecab6c705445eac1c7a84695f7672fcf37e756776b172dabde739d5db1f25980203d2789b372ef5a18773699060d4174c2b65964794e67ae42f5d87503
-
SSDEEP
12288:8WHN1E9Z+v+yxI0W/0rT823E8ugpwrTzE8hEi4noP0+l7+kRQwWlKHaLhYnc4KJk:/1Eb+vbxtTlUfP4q1n
Static task
static1
Behavioral task
behavioral1
Sample
c513c1da60b31eaa8b46870f9f0e29ff_JaffaCakes118.exe
Resource
win7-20240708-en
Malware Config
Extracted
vidar
40
921
https://lenak513.tumblr.com/
-
profile_id
921
Targets
-
-
Target
c513c1da60b31eaa8b46870f9f0e29ff_JaffaCakes118
-
Size
1.4MB
-
MD5
c513c1da60b31eaa8b46870f9f0e29ff
-
SHA1
b564919aeb814216d09f6a79221efcf7a22de7b6
-
SHA256
a2ac6fd6156acf555c5eabc6a1bd33d03f6d569ae5a9485c6c6619d6292fde01
-
SHA512
13f1d7ecab6c705445eac1c7a84695f7672fcf37e756776b172dabde739d5db1f25980203d2789b372ef5a18773699060d4174c2b65964794e67ae42f5d87503
-
SSDEEP
12288:8WHN1E9Z+v+yxI0W/0rT823E8ugpwrTzE8hEi4noP0+l7+kRQwWlKHaLhYnc4KJk:/1Eb+vbxtTlUfP4q1n
-
Vidar family
-
Vidar Stealer
-
Suspicious use of SetThreadContext
-