General

  • Target

    JaffaCakes118_93c3c688d2b514830fcf40e12c9afcc5

  • Size

    717KB

  • Sample

    250108-jldarazraw

  • MD5

    93c3c688d2b514830fcf40e12c9afcc5

  • SHA1

    2e6a34c5c259c57591eadca38ccd5abdfaa823ea

  • SHA256

    4d7a9afae8df2e7cedb7a9d6de3e09c740a5faeb011a82326d08c0d6b1d6bbb7

  • SHA512

    d00f0933eb3664263b1d964436526b329f234a034ec71fb6debe59b3cbc16f2d21da600d870672625102c12a82035ffb945ce0907f4f6f2fac7d99bd56339ae6

  • SSDEEP

    12288:Is3OfozweT6mC4NWf+8ImlGUhmp3fhIz4S//PdBGyozH0Egyb7Doq8Y+UiA:pSozYSWGtcGzCz4S//lkjT0l27Dp

Malware Config

Extracted

Family

vidar

Version

41.5

Botnet

1044

C2

https://mas.to/@xeroxxx

Attributes
  • profile_id

    1044

Targets

    • Target

      JaffaCakes118_93c3c688d2b514830fcf40e12c9afcc5

    • Size

      717KB

    • MD5

      93c3c688d2b514830fcf40e12c9afcc5

    • SHA1

      2e6a34c5c259c57591eadca38ccd5abdfaa823ea

    • SHA256

      4d7a9afae8df2e7cedb7a9d6de3e09c740a5faeb011a82326d08c0d6b1d6bbb7

    • SHA512

      d00f0933eb3664263b1d964436526b329f234a034ec71fb6debe59b3cbc16f2d21da600d870672625102c12a82035ffb945ce0907f4f6f2fac7d99bd56339ae6

    • SSDEEP

      12288:Is3OfozweT6mC4NWf+8ImlGUhmp3fhIz4S//PdBGyozH0Egyb7Doq8Y+UiA:pSozYSWGtcGzCz4S//lkjT0l27Dp

MITRE ATT&CK Enterprise v15

Tasks