General
-
Target
3c5a4a6e0984220de5f8945f7e7d2fb7_JaffaCakes118
-
Size
470KB
-
Sample
240513-xzhz2sae5w
-
MD5
3c5a4a6e0984220de5f8945f7e7d2fb7
-
SHA1
d8cc682345256e7529c06bf6dc61bd262bfb724f
-
SHA256
8ad13febcc803f9ee8a83e5e5dad20e4ab0083b206d2b2c1e1bd5809125031be
-
SHA512
22ecf95c7aab5c71beda5cf45f07d10e3d7b174751d46d5f157239272b84ec4001cc1ddcc4cc9d49c6c70dbb64cdda6e3b0111a0cb53266d23ded811f8905aa0
-
SSDEEP
6144:58E5banFRAD6ByRaFqLjWg5iVkLWHJsFZMrATekM5fLH7kWBxjdpCPyS9TDEx:t6ROuBOjWvVkLWH+TjSllDhBrpCP2
Static task
static1
Behavioral task
behavioral1
Sample
3c5a4a6e0984220de5f8945f7e7d2fb7_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Extracted
quasar
1.3.0.0
Office04
anglekeys.duckdns.org:4782
anglekeys.dynu.com:4782
anglekeys.dynu.net:4782
QSR_MUTEX_sgMP7QuqDU0bxo1dBD
-
encryption_key
NCiE6G1xAqLWGNL2JrfI
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
3c5a4a6e0984220de5f8945f7e7d2fb7_JaffaCakes118
-
Size
470KB
-
MD5
3c5a4a6e0984220de5f8945f7e7d2fb7
-
SHA1
d8cc682345256e7529c06bf6dc61bd262bfb724f
-
SHA256
8ad13febcc803f9ee8a83e5e5dad20e4ab0083b206d2b2c1e1bd5809125031be
-
SHA512
22ecf95c7aab5c71beda5cf45f07d10e3d7b174751d46d5f157239272b84ec4001cc1ddcc4cc9d49c6c70dbb64cdda6e3b0111a0cb53266d23ded811f8905aa0
-
SSDEEP
6144:58E5banFRAD6ByRaFqLjWg5iVkLWHJsFZMrATekM5fLH7kWBxjdpCPyS9TDEx:t6ROuBOjWvVkLWH+TjSllDhBrpCP2
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-