General
-
Target
0ca81a3bec58298a318d19bdf208cb99_JaffaCakes118
-
Size
4.2MB
-
Sample
240625-flgfma1gne
-
MD5
0ca81a3bec58298a318d19bdf208cb99
-
SHA1
cec944263887c4e3ac2956f2a27cbc9be86591d6
-
SHA256
ffe3d6f61150e4a25a4e9549252dc1a505bfd2247f7d3aacec825e1787f089ea
-
SHA512
eda9f6e37ea306e38fa5cdaf5c036782dab19a8dca628af63adb959d75579d014fd17bce5f4e9b5c7c6b24cea2cbaf95fbe849fe93b3e5faa87dbf69bdea1940
-
SSDEEP
12288:yeASxuABkJro+1xtmnzHurEuXu4EnWu5uQpNsuiJoXO1+iy1Qq8a+jI3TiVYzfTF:v
Static task
static1
Behavioral task
behavioral1
Sample
0ca81a3bec58298a318d19bdf208cb99_JaffaCakes118.exe
Resource
win7-20231129-en
Malware Config
Extracted
quasar
2.1.0.0
Skidy
roasted-flag.auto.playit.gg:51952
VNM_MUTEX_bsVy5mHRmaFZMQOLbI
-
encryption_key
ux20jjbixeS7PecgmZeq
-
install_name
windows.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
windows
-
subdirectory
$windows
Targets
-
-
Target
0ca81a3bec58298a318d19bdf208cb99_JaffaCakes118
-
Size
4.2MB
-
MD5
0ca81a3bec58298a318d19bdf208cb99
-
SHA1
cec944263887c4e3ac2956f2a27cbc9be86591d6
-
SHA256
ffe3d6f61150e4a25a4e9549252dc1a505bfd2247f7d3aacec825e1787f089ea
-
SHA512
eda9f6e37ea306e38fa5cdaf5c036782dab19a8dca628af63adb959d75579d014fd17bce5f4e9b5c7c6b24cea2cbaf95fbe849fe93b3e5faa87dbf69bdea1940
-
SSDEEP
12288:yeASxuABkJro+1xtmnzHurEuXu4EnWu5uQpNsuiJoXO1+iy1Qq8a+jI3TiVYzfTF:v
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-