General
-
Target
Jakemanloader.exe
-
Size
3.1MB
-
Sample
240619-zy23mswdnm
-
MD5
85df03293e9fd6fd2bceabcf559d32a5
-
SHA1
c050c1a7e925d1e2bff05adecccd3c0fec1f00d6
-
SHA256
e4ef08c926c4dcb650fc2507468dd14d7f342a7773610809a346b32cc66d2b59
-
SHA512
c4a1c8c8eac076b84b222d1a96af16c846f7a4eac8e77754124f7cb221d70c04df868ccbb3375f3bc8fd81b3fd8e9fc8d7b24dffd6a9ff2cd0180de0f6ea30e8
-
SSDEEP
49152:ZsS4wA2Glaq5+RPelPedKukZ2UrGZMVgQjhIdoGd+BTHHB72eh2NT:ZsWA2Glaq5+RPelPed3kZ2UrGZMVgV
Behavioral task
behavioral1
Sample
Jakemanloader.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
1.4.1
Eyewalled
147.185.221.18:18043
147.185.221.18:1358
a3d2b6d9-f229-4f07-a990-dabdf6a10cde
-
encryption_key
C3103FD765C0AA985FB78C6E1C9F042F8C43DE26
-
install_name
Client.exe
-
log_directory
Client
-
reconnect_delay
3001
-
startup_key
Github.git
-
subdirectory
Management
Targets
-
-
Target
Jakemanloader.exe
-
Size
3.1MB
-
MD5
85df03293e9fd6fd2bceabcf559d32a5
-
SHA1
c050c1a7e925d1e2bff05adecccd3c0fec1f00d6
-
SHA256
e4ef08c926c4dcb650fc2507468dd14d7f342a7773610809a346b32cc66d2b59
-
SHA512
c4a1c8c8eac076b84b222d1a96af16c846f7a4eac8e77754124f7cb221d70c04df868ccbb3375f3bc8fd81b3fd8e9fc8d7b24dffd6a9ff2cd0180de0f6ea30e8
-
SSDEEP
49152:ZsS4wA2Glaq5+RPelPedKukZ2UrGZMVgQjhIdoGd+BTHHB72eh2NT:ZsWA2Glaq5+RPelPed3kZ2UrGZMVgV
-
Quasar payload
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-