General

  • Target

    fc6db6c30bc8cd0320881e6d28dc66369b6498b158a000e741e8ce5133a880f1_JaffaCakes118

  • Size

    3.1MB

  • MD5

    25a6395154a076a0cde54e1e3b84c81c

  • SHA1

    ce41e5f44953088f086d6c3f933e3a5299c5522b

  • SHA256

    fc6db6c30bc8cd0320881e6d28dc66369b6498b158a000e741e8ce5133a880f1

  • SHA512

    d0c9512b2bfe249ae6afca3321affb5727210ccc01bfce25d9a344f4ae35d57038bfb4908986030a1b0d0628a166a4426c81ff9c7477389be9a48791f9ee90ad

  • SSDEEP

    49152:evkt62XlaSFNWPjljiFa2RoUYIH5RJ6ubR3LoGdaDtTHHB72eh2NT:ev462XlaSFNWPjljiFXRoUYIH5RJ6oq

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Hck

C2

jlrat.ddns.net:4782

Mutex

433ebb8e-6680-47bf-824a-7ee529286ae9

Attributes
  • encryption_key

    D0B60855B29A5EA7E7A76C7DAA5DD33E252D53D3

  • install_name

    Client.exe

  • log_directory

    KeyLogger

  • reconnect_delay

    3000

  • startup_key

    Roblox Template

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fc6db6c30bc8cd0320881e6d28dc66369b6498b158a000e741e8ce5133a880f1_JaffaCakes118
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections