General
-
Target
JaffaCakes118_89d2b6b2e5ac7898a9d6903157e64e428bbbff7bc36ef2eccb3617b146e525b7
-
Size
656.5MB
-
Sample
241223-qjzjja1jdl
-
MD5
d266e6cfb64be1d505c047cbd0f5c7cf
-
SHA1
e472a7d9f94f48b9421ed603c25efbcd420b2910
-
SHA256
89d2b6b2e5ac7898a9d6903157e64e428bbbff7bc36ef2eccb3617b146e525b7
-
SHA512
fd0c470c23bea14fc76fe242a0e02159d829a4d5ecf0c3c7ecf0f0917c1198bc6c7642739f79d088c456521be3f020bc1a9933162d4163f746b5a0a55cedc6c9
-
SSDEEP
49152:Ot4/d5Zu6rTxefPihoa2ZErpQgIsdMfiIqPH1O+KQGZrfzxAB3F:Ot4V/nTgni6PZErpQgkKIK1O+KQi/x4F
Behavioral task
behavioral1
Sample
JaffaCakes118_89d2b6b2e5ac7898a9d6903157e64e428bbbff7bc36ef2eccb3617b146e525b7.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
2.1
546
https://t.me/misteryworldismyhome
https://t.me/montgomerywavesgetlucky
https://t.me/prokl3hfy
-
profile_id
546
Targets
-
-
Target
JaffaCakes118_89d2b6b2e5ac7898a9d6903157e64e428bbbff7bc36ef2eccb3617b146e525b7
-
Size
656.5MB
-
MD5
d266e6cfb64be1d505c047cbd0f5c7cf
-
SHA1
e472a7d9f94f48b9421ed603c25efbcd420b2910
-
SHA256
89d2b6b2e5ac7898a9d6903157e64e428bbbff7bc36ef2eccb3617b146e525b7
-
SHA512
fd0c470c23bea14fc76fe242a0e02159d829a4d5ecf0c3c7ecf0f0917c1198bc6c7642739f79d088c456521be3f020bc1a9933162d4163f746b5a0a55cedc6c9
-
SSDEEP
49152:Ot4/d5Zu6rTxefPihoa2ZErpQgIsdMfiIqPH1O+KQGZrfzxAB3F:Ot4V/nTgni6PZErpQgkKIK1O+KQi/x4F
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-