General
-
Target
39d0db6e95e2a7e23fcd637085f8496d_JaffaCakes118
-
Size
1.8MB
-
Sample
240512-nc3aqsce4y
-
MD5
39d0db6e95e2a7e23fcd637085f8496d
-
SHA1
5293d9124ca789c27c77ee9f2a27dbdbd5a619f2
-
SHA256
070ad3ab33bffaf96b8638b302117cde7f4f417759b00f8497b1a1c076844575
-
SHA512
f07ebd353dc6a0e87481d6a5e3abe9beaf7ed337eae4acdda7074aa84ef09dfe30835f9ccf764584676453fdaa17fe96f077815ad01c885f08e786eacd2a3f3f
-
SSDEEP
12288:5WyG8PdU1cWK84twtShjMXoT8hke1X3v7F:3G8POL4twIhw4T8hke1HR
Static task
static1
Behavioral task
behavioral1
Sample
39d0db6e95e2a7e23fcd637085f8496d_JaffaCakes118.exe
Resource
win7-20240215-en
Malware Config
Extracted
quasar
-
reconnect_delay
1250
Extracted
quasar
1.3.0.0
Office04
dedi001.dynip.online:1604
QSR_MUTEX_fUMlvet13pGJVZGtTl
-
encryption_key
cmUQwSOc5zCRWKiUUZBH
-
install_name
audiodg.exe
-
log_directory
Logs
-
reconnect_delay
1250
-
startup_key
Cortana
-
subdirectory
temp000
Targets
-
-
Target
39d0db6e95e2a7e23fcd637085f8496d_JaffaCakes118
-
Size
1.8MB
-
MD5
39d0db6e95e2a7e23fcd637085f8496d
-
SHA1
5293d9124ca789c27c77ee9f2a27dbdbd5a619f2
-
SHA256
070ad3ab33bffaf96b8638b302117cde7f4f417759b00f8497b1a1c076844575
-
SHA512
f07ebd353dc6a0e87481d6a5e3abe9beaf7ed337eae4acdda7074aa84ef09dfe30835f9ccf764584676453fdaa17fe96f077815ad01c885f08e786eacd2a3f3f
-
SSDEEP
12288:5WyG8PdU1cWK84twtShjMXoT8hke1X3v7F:3G8POL4twIhw4T8hke1HR
-
Quasar payload
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-