General
-
Target
8c48c8c45d7f3bdd3c888a1c75fa9b27_JaffaCakes118
-
Size
718KB
-
Sample
240602-ak621acf42
-
MD5
8c48c8c45d7f3bdd3c888a1c75fa9b27
-
SHA1
1d212ea492feb0c4695745d51ac0ac2e9fb7b2b5
-
SHA256
9aab35f222f2953738e83432940f14af4e12e72a741f80fa5dec7d0197ed6e7a
-
SHA512
f2a4a77bdb4a3ce39eda27121dfe01f71f91cd3d89b52098c71140fa89b3b89259a9c5e3323953ac332d42af2df1ef0eebe9801a25749b4965bf635c1a841deb
-
SSDEEP
12288:XEv8FVujUpVTWgThfJ614X5p/iYHI0Oq8M0oko8ZiFhDF8KSpTTj/XL817n3WGhs:XEEbuQ9WmD1HITPTnXL81LDhhWeOqJEx
Static task
static1
Behavioral task
behavioral1
Sample
8c48c8c45d7f3bdd3c888a1c75fa9b27_JaffaCakes118.exe
Resource
win7-20240215-en
Malware Config
Extracted
quasar
1.3.0.0
svchost
scvhosts.duckdns.org:1604
QSR_MUTEX_InsAUB54MmLlzTys9a
-
encryption_key
pOXtQTNjkHXEe8G4lu1f
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Svchost
-
subdirectory
svchost
Targets
-
-
Target
8c48c8c45d7f3bdd3c888a1c75fa9b27_JaffaCakes118
-
Size
718KB
-
MD5
8c48c8c45d7f3bdd3c888a1c75fa9b27
-
SHA1
1d212ea492feb0c4695745d51ac0ac2e9fb7b2b5
-
SHA256
9aab35f222f2953738e83432940f14af4e12e72a741f80fa5dec7d0197ed6e7a
-
SHA512
f2a4a77bdb4a3ce39eda27121dfe01f71f91cd3d89b52098c71140fa89b3b89259a9c5e3323953ac332d42af2df1ef0eebe9801a25749b4965bf635c1a841deb
-
SSDEEP
12288:XEv8FVujUpVTWgThfJ614X5p/iYHI0Oq8M0oko8ZiFhDF8KSpTTj/XL817n3WGhs:XEEbuQ9WmD1HITPTnXL81LDhhWeOqJEx
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-