General
-
Target
4c2035a0494f1e280a9383677f2501fd_JaffaCakes118
-
Size
6.3MB
-
Sample
240516-vhkq7sef99
-
MD5
4c2035a0494f1e280a9383677f2501fd
-
SHA1
ce190f82c9bdf2652906cafba1a6727e276fd540
-
SHA256
036ccf870c0c626dfab5ff245db67b961d6669af26c3694992b56271a4e979ea
-
SHA512
39206b5b9c00ce04bd1e710f0af7f76f4c522d019f55f7c32c62f9973ec12123fd7dd03897e6de3ed925519dcd263f4981ed7d34ee01304642440fbe2a7e0108
-
SSDEEP
98304:awAwD+xPQPHGGHtWUolKiTQSLQ+NIv9xEDginRBnyecCkyzyNjk:awBAPoHtBoFTQSLQ9VxyyecCLz7
Static task
static1
Behavioral task
behavioral1
Sample
4c2035a0494f1e280a9383677f2501fd_JaffaCakes118.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
1.3.0.0
SyScmd
91.211.251.108:4782
QSR_MUTEX_qwefagr3235weasfefwwef
-
encryption_key
nWKoI3fOkpyNHoDWEE4y
-
install_name
Update.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
syswow
-
subdirectory
Microsoft\Windows\Update
Targets
-
-
Target
4c2035a0494f1e280a9383677f2501fd_JaffaCakes118
-
Size
6.3MB
-
MD5
4c2035a0494f1e280a9383677f2501fd
-
SHA1
ce190f82c9bdf2652906cafba1a6727e276fd540
-
SHA256
036ccf870c0c626dfab5ff245db67b961d6669af26c3694992b56271a4e979ea
-
SHA512
39206b5b9c00ce04bd1e710f0af7f76f4c522d019f55f7c32c62f9973ec12123fd7dd03897e6de3ed925519dcd263f4981ed7d34ee01304642440fbe2a7e0108
-
SSDEEP
98304:awAwD+xPQPHGGHtWUolKiTQSLQ+NIv9xEDginRBnyecCkyzyNjk:awBAPoHtBoFTQSLQ9VxyyecCLz7
-
Quasar payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-