General
-
Target
4e0a39ab057a9e884255df35dbf240ca_JaffaCakes118
-
Size
711KB
-
Sample
240517-czyqaade58
-
MD5
4e0a39ab057a9e884255df35dbf240ca
-
SHA1
9f431640264b1cbf5d8a9666d33c868a1e6ebfd7
-
SHA256
4a95103a4f893c6c17b66af8f872093b97d836f6277195e1c60339341da4f276
-
SHA512
7963afa8b19329b53e2fb12751ea04cceba8f58401315b16f21b300c555f5a8c4473ec19aec694a7f32789fa243dc0f8edc3247463a6f3551bff99fe858069a4
-
SSDEEP
12288:B8JsIitBttf+zZa7oPNr3JfjLxEwvmcmsq43reb+z3vt4snmMszSN:CaBJeK0r5hVvlRqEreq7WbY
Static task
static1
Behavioral task
behavioral1
Sample
4e0a39ab057a9e884255df35dbf240ca_JaffaCakes118.exe
Resource
win7-20240508-en
Malware Config
Extracted
quasar
1.3.0.0
1805
allahoyunda.duckdns.org:1604
QSR_MUTEX_Fq5eq2CLhdcvCvtnCW
-
encryption_key
35KaV9hUWCm5Me7Z03OO
-
install_name
svchosts.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
java
-
subdirectory
svchost
Targets
-
-
Target
4e0a39ab057a9e884255df35dbf240ca_JaffaCakes118
-
Size
711KB
-
MD5
4e0a39ab057a9e884255df35dbf240ca
-
SHA1
9f431640264b1cbf5d8a9666d33c868a1e6ebfd7
-
SHA256
4a95103a4f893c6c17b66af8f872093b97d836f6277195e1c60339341da4f276
-
SHA512
7963afa8b19329b53e2fb12751ea04cceba8f58401315b16f21b300c555f5a8c4473ec19aec694a7f32789fa243dc0f8edc3247463a6f3551bff99fe858069a4
-
SSDEEP
12288:B8JsIitBttf+zZa7oPNr3JfjLxEwvmcmsq43reb+z3vt4snmMszSN:CaBJeK0r5hVvlRqEreq7WbY
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-