General
-
Target
4310aad51c7722f9136cbb0156e16718_JaffaCakes118
-
Size
348KB
-
Sample
240514-zwfrmagc9y
-
MD5
4310aad51c7722f9136cbb0156e16718
-
SHA1
fa73a3bbd71a2ba1358a899b1dc0e4fc956bc872
-
SHA256
cdbc749cebbe862012e78f57d1d391db776a397db2d42f871dd25edeb7055f4e
-
SHA512
243f71fdfceffd2d437f08df7fd1b37fee42b0a5840187b2785699a4e4aabf87797bde0358c187507b01d6ee632d92ffad8f2f05c6e1df43cc1126c2acbdeb85
-
SSDEEP
6144:3TNHXf500MdFe4jngKBSb2tDjgL67ugOoLd51ZG:jd50VvndZJ8L6vRLd57G
Behavioral task
behavioral1
Sample
4310aad51c7722f9136cbb0156e16718_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Extracted
quasar
1.3.0.0
Main
96.8.121.101:1738
QSR_MUTEX_y9rJxgpEmlopTsZPRb
-
encryption_key
bVA0J9HzEeCVsbzCPgiY
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
windows
Targets
-
-
Target
4310aad51c7722f9136cbb0156e16718_JaffaCakes118
-
Size
348KB
-
MD5
4310aad51c7722f9136cbb0156e16718
-
SHA1
fa73a3bbd71a2ba1358a899b1dc0e4fc956bc872
-
SHA256
cdbc749cebbe862012e78f57d1d391db776a397db2d42f871dd25edeb7055f4e
-
SHA512
243f71fdfceffd2d437f08df7fd1b37fee42b0a5840187b2785699a4e4aabf87797bde0358c187507b01d6ee632d92ffad8f2f05c6e1df43cc1126c2acbdeb85
-
SSDEEP
6144:3TNHXf500MdFe4jngKBSb2tDjgL67ugOoLd51ZG:jd50VvndZJ8L6vRLd57G
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-