General
-
Target
JaffaCakes118_9dc800c25349a952cf4e972456f4054d6e8f8798505cc1a4fdbdb5e72ca38310
-
Size
3.7MB
-
Sample
241225-qj83zatper
-
MD5
5fc023fc26f82679558274acf31c6c79
-
SHA1
d7233581fe4e78f8a73650d407a0a9cd439d0ea8
-
SHA256
9dc800c25349a952cf4e972456f4054d6e8f8798505cc1a4fdbdb5e72ca38310
-
SHA512
f9605cabede4c48d5762c82722fb120637ccad74fc8b96f50deb31b8cad18ae91e3cabbcf7f39649f4ac3fe7df67dd5ef66e6f4d1cb9598fac0e380541d68e13
-
SSDEEP
98304:4ZEZMQXXsVhd6W2y1vmbTDHJj+G98Ir5BZVQB:CpQnsHdKEY/HJj+vItBZVw
Static task
static1
Behavioral task
behavioral1
Sample
806DDBB70CE7CF024D8C8D7206020007B303F0FB70F67445D898517944C91A20.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
806DDBB70CE7CF024D8C8D7206020007B303F0FB70F67445D898517944C91A20.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
darkcomet
netshare
novachrono.dyndns-ip.com:51399
DC_MUTEX-6JFEBFK
-
gencode
jJtniSTX6QWK
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
quasar
1.4.0
Office15
novachrono.dyndns-ip.com:51396
f855a54f-46fa-48dc-a390-f591a2e4bd98
-
encryption_key
E5D6E7988D0C5E1B3786B30C1AE84CBBC1CF4B1E
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
asyncrat
0.5.7B
Default
novachrono.dyndns-ip.com:51397
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
repair-win.exe
-
install_folder
%AppData%
Targets
-
-
Target
806DDBB70CE7CF024D8C8D7206020007B303F0FB70F67445D898517944C91A20
-
Size
3.8MB
-
MD5
c1dc1d013b521ff6725e1e674da41209
-
SHA1
414e10310c572e8edf7a127937033e2f23e5176d
-
SHA256
806ddbb70ce7cf024d8c8d7206020007b303f0fb70f67445d898517944c91a20
-
SHA512
c03f343dd4c1cd7b22e7f953ac7778116b5aebba8f47259d4773659196e6db807054aea7156a5b412a438acecf0041f07dac9a3dbbaf13105457d08029550a36
-
SSDEEP
98304:HAI+n8ys9crUL7CKY+0lM4VI5I2mTcin9AUcPTLm17Vs+uy:gt8ysYUL7CJ+01VIcwORa+uy
-
Asyncrat family
-
Darkcomet family
-
Quasar family
-
Quasar payload
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
1Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Query Registry
5Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
1