General
-
Target
JaffaCakes118_c2d6659d1cac1af139ded8d7b5649454
-
Size
872KB
-
Sample
250109-jth6zawmfr
-
MD5
c2d6659d1cac1af139ded8d7b5649454
-
SHA1
a5408a4c994ba710b2137c9da64113a5a75efe67
-
SHA256
65e225c8c6394c626a8c9c10551df2517e4d3988ddaf34b2339c65074b0fef85
-
SHA512
85727986c6306abc7c813df0d1108af0b4ef5886425e8053831928bb323570f1663cd17d7f9db606c2b2ae8f34bce5432a8daccef43240917829831cd7f83d14
-
SSDEEP
24576:2vLjiXcvLx5UCcoGWTUchpx0sEvQtyVbOt:2DjiMvFvcoGWAchpOs9t
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c2d6659d1cac1af139ded8d7b5649454.exe
Resource
win7-20240903-en
Malware Config
Extracted
vidar
41.5
517
https://mas.to/@xeroxxx
-
profile_id
517
Targets
-
-
Target
JaffaCakes118_c2d6659d1cac1af139ded8d7b5649454
-
Size
872KB
-
MD5
c2d6659d1cac1af139ded8d7b5649454
-
SHA1
a5408a4c994ba710b2137c9da64113a5a75efe67
-
SHA256
65e225c8c6394c626a8c9c10551df2517e4d3988ddaf34b2339c65074b0fef85
-
SHA512
85727986c6306abc7c813df0d1108af0b4ef5886425e8053831928bb323570f1663cd17d7f9db606c2b2ae8f34bce5432a8daccef43240917829831cd7f83d14
-
SSDEEP
24576:2vLjiXcvLx5UCcoGWTUchpx0sEvQtyVbOt:2DjiMvFvcoGWAchpOs9t
-
Vidar family
-
Vidar Stealer
-
Suspicious use of SetThreadContext
-