General

  • Target

    a9b5fb701a6d8bdb6a96bc14e07f74d4_JaffaCakes118

  • Size

    1.7MB

  • Sample

    240614-ptxl9avclq

  • MD5

    a9b5fb701a6d8bdb6a96bc14e07f74d4

  • SHA1

    d9f58e932885f3b46af2386899640f2796b10027

  • SHA256

    8c2ac7c0542810307230fba2f195317d0251fc253ec71b4b88216eba747db8c7

  • SHA512

    5b35a210abd8f68c24a142a91e64d7578828756d1809364051991981aed37eaf0c3da6cea2470883a9a1e9818441d3c463c6b7df2d4e5085fc38add20ebd8a19

  • SSDEEP

    49152:tXfSL083FMeBQHt1C8NBcmPHy7es6028igRe0:xS1GJHt46Bxv1gRe0

Malware Config

Targets

    • Target

      a9b5fb701a6d8bdb6a96bc14e07f74d4_JaffaCakes118

    • Size

      1.7MB

    • MD5

      a9b5fb701a6d8bdb6a96bc14e07f74d4

    • SHA1

      d9f58e932885f3b46af2386899640f2796b10027

    • SHA256

      8c2ac7c0542810307230fba2f195317d0251fc253ec71b4b88216eba747db8c7

    • SHA512

      5b35a210abd8f68c24a142a91e64d7578828756d1809364051991981aed37eaf0c3da6cea2470883a9a1e9818441d3c463c6b7df2d4e5085fc38add20ebd8a19

    • SSDEEP

      49152:tXfSL083FMeBQHt1C8NBcmPHy7es6028igRe0:xS1GJHt46Bxv1gRe0

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks