General

  • Target

    a6750a74736787e997cea380247a97f2_JaffaCakes118

  • Size

    485KB

  • Sample

    240613-trsmqszekr

  • MD5

    a6750a74736787e997cea380247a97f2

  • SHA1

    7d25daa8359e023f8bb3bdb4c4fa77c2eeb19195

  • SHA256

    54e33e90fc6174e079fbb5d00abd7f3d2c8ad9bcc8c67910f3c21e4f31282aa0

  • SHA512

    6d029e775fb53e086c4f97a4594c919c976a49a58ecd1495d7c007206c3ef01a7b4c650a792734b17ee291c68bb96bd1175d9d40e3c1226318bc8bffc7185b23

  • SSDEEP

    12288:DVm5YyKReiCZp4o2ylxSyx9F7TPeBfoZ/mi:J8Yeimeyrr1elos

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

svhost

C2

myconect.ddns.net:6606

Mutex

VNM_MUTEX_ND6PULLW5ZVLwo1nwR

Attributes
  • encryption_key

    yaa63tXY4j55os5llHHd

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      a6750a74736787e997cea380247a97f2_JaffaCakes118

    • Size

      485KB

    • MD5

      a6750a74736787e997cea380247a97f2

    • SHA1

      7d25daa8359e023f8bb3bdb4c4fa77c2eeb19195

    • SHA256

      54e33e90fc6174e079fbb5d00abd7f3d2c8ad9bcc8c67910f3c21e4f31282aa0

    • SHA512

      6d029e775fb53e086c4f97a4594c919c976a49a58ecd1495d7c007206c3ef01a7b4c650a792734b17ee291c68bb96bd1175d9d40e3c1226318bc8bffc7185b23

    • SSDEEP

      12288:DVm5YyKReiCZp4o2ylxSyx9F7TPeBfoZ/mi:J8Yeimeyrr1elos

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • VenomRAT

      VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Drops desktop.ini file(s)

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks