General

  • Target

    JaffaCakes118_f27bbd676025bd515c3202b94dff8ef6

  • Size

    802KB

  • Sample

    250111-azhyqaxpgr

  • MD5

    f27bbd676025bd515c3202b94dff8ef6

  • SHA1

    39949785532d90fd4ace3faf87ace6311b15ff22

  • SHA256

    e6d90883fd0e3c7576c140d6f12e04e1e54c3789ec4b2bdea925c9bdb6aa1f43

  • SHA512

    2472b5f44cb2ccb4b55e2b87427564db2e59147bf555e61fbab11ae2b50a751a7e32caf78e2c419693b91008b6361764063ca0e9c8df8e44f41f55682c6b4723

  • SSDEEP

    24576:pAT8QE+kwrcszsNcf7fZhB0xxq+SxHKTcFX:pAI+3zsO7ffB0xr0qw

Malware Config

Extracted

Family

redline

Botnet

V4

C2

3.17.66.208:50383

Attributes
  • auth_value

    7d7838681b4703ce5a8521eb0b68ca0c

Extracted

Family

vidar

Version

41.5

Botnet

915

C2

https://mas.to/@xeroxxx

Attributes
  • profile_id

    915

Targets

    • Target

      JaffaCakes118_f27bbd676025bd515c3202b94dff8ef6

    • Size

      802KB

    • MD5

      f27bbd676025bd515c3202b94dff8ef6

    • SHA1

      39949785532d90fd4ace3faf87ace6311b15ff22

    • SHA256

      e6d90883fd0e3c7576c140d6f12e04e1e54c3789ec4b2bdea925c9bdb6aa1f43

    • SHA512

      2472b5f44cb2ccb4b55e2b87427564db2e59147bf555e61fbab11ae2b50a751a7e32caf78e2c419693b91008b6361764063ca0e9c8df8e44f41f55682c6b4723

    • SSDEEP

      24576:pAT8QE+kwrcszsNcf7fZhB0xxq+SxHKTcFX:pAI+3zsO7ffB0xr0qw

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Vidar family

    • Vidar Stealer

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks