General

  • Target

    4c5517f7d4f0e77f98f8c3f033ac0269_JaffaCakes118

  • Size

    255KB

  • Sample

    240516-wgwbzsgf97

  • MD5

    4c5517f7d4f0e77f98f8c3f033ac0269

  • SHA1

    fc4c6890bb5cb90d4492995b0f18d9cea022a9a2

  • SHA256

    98428fa8e72274d66f364f230fd1800f6c79f9a82b302e796234cf93e889eb87

  • SHA512

    aea401db7f8f533f079702aaa5c2013ba94d18cd839267ebf00c079d36689711a6f10ada957d6d876b8906c778811f41b71ca8ce52f06a156ba0f2ad966b5403

  • SSDEEP

    6144:GunF3/mw+NhZ7cJfqG0K+UvhvEnbEsxM0i:GEJiG0KXsxM0i

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

INFECT

C2

159.203.16.166:8383

aylmao1337.tk:8383

Mutex

QSR_MUTEX_dgkusG8Joof1DH7joH

Attributes
  • encryption_key

    fyU8ilcpYcOXqkxlxJir

  • install_name

    SysInterrupts32.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    System interrupts

  • subdirectory

    Microsoft

Targets

    • Target

      4c5517f7d4f0e77f98f8c3f033ac0269_JaffaCakes118

    • Size

      255KB

    • MD5

      4c5517f7d4f0e77f98f8c3f033ac0269

    • SHA1

      fc4c6890bb5cb90d4492995b0f18d9cea022a9a2

    • SHA256

      98428fa8e72274d66f364f230fd1800f6c79f9a82b302e796234cf93e889eb87

    • SHA512

      aea401db7f8f533f079702aaa5c2013ba94d18cd839267ebf00c079d36689711a6f10ada957d6d876b8906c778811f41b71ca8ce52f06a156ba0f2ad966b5403

    • SSDEEP

      6144:GunF3/mw+NhZ7cJfqG0K+UvhvEnbEsxM0i:GEJiG0KXsxM0i

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks