General
-
Target
JaffaCakes118_de3f1fd0fbd8e2527b0df2a8a42e9bee8b7e498c75a0da57acd5d2db275476c6
-
Size
833.6MB
-
Sample
241225-hp2bba1kam
-
MD5
e249a985e3fe64f1a4b714ddfca27459
-
SHA1
9adc1168b991e798f685b6ae10cf507dba3b080d
-
SHA256
de3f1fd0fbd8e2527b0df2a8a42e9bee8b7e498c75a0da57acd5d2db275476c6
-
SHA512
3b4612473dc0e150894ca40b4cc9276a500fff4222473984ef5cf9501bdaa44f3397503b6956ed7a600333b4382fa61688194b9e74fa2f1d5568200f15d00a9c
-
SSDEEP
98304:FH5/B8ao6KIbiyueYSTRvWkeUQPNPapIFsIHOFBEJ2RFnLiYw:FkTY6THVJ2RFnP
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_de3f1fd0fbd8e2527b0df2a8a42e9bee8b7e498c75a0da57acd5d2db275476c6.exe
Resource
win7-20241023-en
Malware Config
Extracted
vidar
56.4
1911
https://t.me/iseepass
https://steamcommunity.com/profiles/76561199459255837
http://65.108.93.119:80
-
profile_id
1911
Targets
-
-
Target
JaffaCakes118_de3f1fd0fbd8e2527b0df2a8a42e9bee8b7e498c75a0da57acd5d2db275476c6
-
Size
833.6MB
-
MD5
e249a985e3fe64f1a4b714ddfca27459
-
SHA1
9adc1168b991e798f685b6ae10cf507dba3b080d
-
SHA256
de3f1fd0fbd8e2527b0df2a8a42e9bee8b7e498c75a0da57acd5d2db275476c6
-
SHA512
3b4612473dc0e150894ca40b4cc9276a500fff4222473984ef5cf9501bdaa44f3397503b6956ed7a600333b4382fa61688194b9e74fa2f1d5568200f15d00a9c
-
SSDEEP
98304:FH5/B8ao6KIbiyueYSTRvWkeUQPNPapIFsIHOFBEJ2RFnLiYw:FkTY6THVJ2RFnP
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1