General
-
Target
JaffaCakes118_f9b30b3125e7a08193def881a84864facbd5bfcd2f734a6652d5e7a0091f1a36
-
Size
781.5MB
-
Sample
241224-a1ebxswphv
-
MD5
3475bb2a3f5bfdc45300ba309d4d432e
-
SHA1
82d83e5df1575ea238f8a01f803a66a2ced373b5
-
SHA256
f9b30b3125e7a08193def881a84864facbd5bfcd2f734a6652d5e7a0091f1a36
-
SHA512
97a242f6f3ba9b4e9382b0861a0aea919f98293b7b663631dc3632079a55604d90a8fe20c592d8334c1789c358f95f96f214242f65489ccc68177d11195931a4
-
SSDEEP
49152:cFJo/Z4MC3PzzhdpD4auKqDrTLVO6l9ZUv7W149b4VKaItNZXj7vWkQnYva:n/Z4xDJhurTI6l9MEUb4I5tNZj7vJyYi
Behavioral task
behavioral1
Sample
JaffaCakes118_f9b30b3125e7a08193def881a84864facbd5bfcd2f734a6652d5e7a0091f1a36.exe
Resource
win7-20241010-en
Malware Config
Extracted
vidar
5.6
211a7d154fcc696ee9e240a38d4c9cae
https://t.me/booliiksws
https://t.me/bonoboaz
https://steamcommunity.com/profiles/76561199550790047
http://80.85.241.108:80
-
profile_id_v2
211a7d154fcc696ee9e240a38d4c9cae
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 OPR/103.0.0.0
Targets
-
-
Target
JaffaCakes118_f9b30b3125e7a08193def881a84864facbd5bfcd2f734a6652d5e7a0091f1a36
-
Size
781.5MB
-
MD5
3475bb2a3f5bfdc45300ba309d4d432e
-
SHA1
82d83e5df1575ea238f8a01f803a66a2ced373b5
-
SHA256
f9b30b3125e7a08193def881a84864facbd5bfcd2f734a6652d5e7a0091f1a36
-
SHA512
97a242f6f3ba9b4e9382b0861a0aea919f98293b7b663631dc3632079a55604d90a8fe20c592d8334c1789c358f95f96f214242f65489ccc68177d11195931a4
-
SSDEEP
49152:cFJo/Z4MC3PzzhdpD4auKqDrTLVO6l9ZUv7W149b4VKaItNZXj7vWkQnYva:n/Z4xDJhurTI6l9MEUb4I5tNZj7vJyYi
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1