General
-
Target
JaffaCakes118_ed422c419c32f42e75d854a9d44781f24fa771822b0298ecac499e6863920a6c
-
Size
815.4MB
-
Sample
241225-zb4b7awpdx
-
MD5
757a441a4eaad964c783c5b072586b38
-
SHA1
8abade2a0b0453ce8291852082e62f40b04f5b0a
-
SHA256
ed422c419c32f42e75d854a9d44781f24fa771822b0298ecac499e6863920a6c
-
SHA512
6703f43c5d42ab8f9f89c474061cc685153c3c6428fc019a20d9faaf9e31ab41962117a831932266db9f5584e7bbd9da72d856849095837a95b4c395f3d9a81e
-
SSDEEP
49152:fERHnw1qeeHvLk4E7jrl1mZ47aIotnsPSNNISLfZNlYlV3KGpYHxx/Msj:fE1/HvypotNLfZNlKVs3/Msj
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ed422c419c32f42e75d854a9d44781f24fa771822b0298ecac499e6863920a6c.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
755
Extracted
vidar
2.5
762
https://t.me/noktasina
https://steamcommunity.com/profiles/76561199478503353
http://95.217.152.87:80
-
profile_id
762
-
user_agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.0.0 Safari/537.36
Targets
-
-
Target
JaffaCakes118_ed422c419c32f42e75d854a9d44781f24fa771822b0298ecac499e6863920a6c
-
Size
815.4MB
-
MD5
757a441a4eaad964c783c5b072586b38
-
SHA1
8abade2a0b0453ce8291852082e62f40b04f5b0a
-
SHA256
ed422c419c32f42e75d854a9d44781f24fa771822b0298ecac499e6863920a6c
-
SHA512
6703f43c5d42ab8f9f89c474061cc685153c3c6428fc019a20d9faaf9e31ab41962117a831932266db9f5584e7bbd9da72d856849095837a95b4c395f3d9a81e
-
SSDEEP
49152:fERHnw1qeeHvLk4E7jrl1mZ47aIotnsPSNNISLfZNlYlV3KGpYHxx/Msj:fE1/HvypotNLfZNlKVs3/Msj
-
Vidar family
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Suspicious use of SetThreadContext
-