General

  • Target

    JaffaCakes118_b63be4801143d6ec6d266fbca59ef4e5

  • Size

    695KB

  • Sample

    250109-bga1ts1ndv

  • MD5

    b63be4801143d6ec6d266fbca59ef4e5

  • SHA1

    e0fc2580fc04925e1e26d71fb050e1fd2655caea

  • SHA256

    e7191844d050542e62e8ed0942ea1c6542c3c260067b509c06bdac6483d3eba8

  • SHA512

    d83b4281af87c403593265fa9c7cfb6cfd1a166075f53086abb6312315a4665f8617873a1765a90ff87df9a7e9bcd9f8d704168b2b188a8f801cd8eebc4abb81

  • SSDEEP

    12288:2T89b66pQ9b/rrijldt/ET+3EaTDRlt+fCKzPFOpjTqDNxD:2A565XWjjtcedTDRL+7J5

Malware Config

Extracted

Family

vidar

Version

41.5

Botnet

1044

C2

https://mas.to/@xeroxxx

Attributes
  • profile_id

    1044

Targets

    • Target

      JaffaCakes118_b63be4801143d6ec6d266fbca59ef4e5

    • Size

      695KB

    • MD5

      b63be4801143d6ec6d266fbca59ef4e5

    • SHA1

      e0fc2580fc04925e1e26d71fb050e1fd2655caea

    • SHA256

      e7191844d050542e62e8ed0942ea1c6542c3c260067b509c06bdac6483d3eba8

    • SHA512

      d83b4281af87c403593265fa9c7cfb6cfd1a166075f53086abb6312315a4665f8617873a1765a90ff87df9a7e9bcd9f8d704168b2b188a8f801cd8eebc4abb81

    • SSDEEP

      12288:2T89b66pQ9b/rrijldt/ET+3EaTDRlt+fCKzPFOpjTqDNxD:2A565XWjjtcedTDRL+7J5

MITRE ATT&CK Enterprise v15

Tasks