General
-
Target
aa3e98f2f621c0f160b64bf9a5578ea4_JaffaCakes118
-
Size
348KB
-
Sample
240614-r4wttayerk
-
MD5
aa3e98f2f621c0f160b64bf9a5578ea4
-
SHA1
89f79d0b76b1304c3aa46ef990dc372c7f9418a1
-
SHA256
118715ae5a95abe6d4f72e498d390c398db5b8fe2240293c76c5356460cb7539
-
SHA512
918c1e5293697d7b63c66f1e4a65799e967a35b644bda077fa33edaa4fff4f1c9a9383f332506804ac805ce176d4a5abbbb1a21b21c39d9c6bf9d05780e3ee77
-
SSDEEP
6144:IfNHXf500MVdzr49i1A6buGJ8ln6Xh86jsZTFkPgD:+d50NQftGJu6Xh/yTFkPgD
Behavioral task
behavioral1
Sample
aa3e98f2f621c0f160b64bf9a5578ea4_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
aa3e98f2f621c0f160b64bf9a5578ea4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
quasar
1.3.0.0
guestlox228
103.28.149.74:1604
QSR_MUTEX_kBoGj0kqXQsz7AgjCf
-
encryption_key
9wM99evuMRa3Il14tKO1
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft OneDrive
-
subdirectory
SubDir
Targets
-
-
Target
aa3e98f2f621c0f160b64bf9a5578ea4_JaffaCakes118
-
Size
348KB
-
MD5
aa3e98f2f621c0f160b64bf9a5578ea4
-
SHA1
89f79d0b76b1304c3aa46ef990dc372c7f9418a1
-
SHA256
118715ae5a95abe6d4f72e498d390c398db5b8fe2240293c76c5356460cb7539
-
SHA512
918c1e5293697d7b63c66f1e4a65799e967a35b644bda077fa33edaa4fff4f1c9a9383f332506804ac805ce176d4a5abbbb1a21b21c39d9c6bf9d05780e3ee77
-
SSDEEP
6144:IfNHXf500MVdzr49i1A6buGJ8ln6Xh86jsZTFkPgD:+d50NQftGJu6Xh/yTFkPgD
Score10/10-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-