General
-
Target
78b9f217ca7f78a34e558ecc5e61bbe1_JaffaCakes118
-
Size
247KB
-
Sample
240527-lq9kvsgd69
-
MD5
78b9f217ca7f78a34e558ecc5e61bbe1
-
SHA1
3a6f51af13d6357ff3718b82490fc19b203ea5fa
-
SHA256
d87f8f1d4a38fc2d15dac5c57f74fd61e1c712e4684c10db18ff5fc00ed07bac
-
SHA512
67dbebf6f00309fd2928fc75b8afd940d4a598c8b96c7fa1a6ec672e9dce7aaaabc27a992c7b7c7528f7866f648f1e5e1718a669f64c7731e77165beff966527
-
SSDEEP
6144:vi8ju8hJsKdmmBPMF6FKAw0gfE1cVr78eZRduif/:vM8LdBCFKKV0gccVHxf/
Static task
static1
Behavioral task
behavioral1
Sample
78b9f217ca7f78a34e558ecc5e61bbe1_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Extracted
quasar
1.3.0.0
Office04
ipaixincungduoc.hopto.org:3389
ipaixincungok.hopto.org:3389
QSR_MUTEX_nNZSBb4AKQyYo1cS8B
-
encryption_key
CLfGeDzyrgMe5rMRQTJb
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
78b9f217ca7f78a34e558ecc5e61bbe1_JaffaCakes118
-
Size
247KB
-
MD5
78b9f217ca7f78a34e558ecc5e61bbe1
-
SHA1
3a6f51af13d6357ff3718b82490fc19b203ea5fa
-
SHA256
d87f8f1d4a38fc2d15dac5c57f74fd61e1c712e4684c10db18ff5fc00ed07bac
-
SHA512
67dbebf6f00309fd2928fc75b8afd940d4a598c8b96c7fa1a6ec672e9dce7aaaabc27a992c7b7c7528f7866f648f1e5e1718a669f64c7731e77165beff966527
-
SSDEEP
6144:vi8ju8hJsKdmmBPMF6FKAw0gfE1cVr78eZRduif/:vM8LdBCFKKV0gccVHxf/
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-