General
-
Target
JaffaCakes118_54fd1c1af0f12d1ff54ab8901e9ce266
-
Size
6.6MB
-
Sample
250101-pljenavjg1
-
MD5
54fd1c1af0f12d1ff54ab8901e9ce266
-
SHA1
f50e95582506de109115a2d46c9d2fae6caa238d
-
SHA256
c563c2586cc408faf2c05f25fcddb9049e8432d76f6fea16556f75d6ad380ce3
-
SHA512
21c45d652b2433a9ecc042bec756708e94dd7b648187d24efd178e0eae639e7a541cfe83cca443204cd1dd95e3e6b0b1cd7d62b495efa02cf073b9a4a2628c26
-
SSDEEP
196608:m+AJG9mLg53HRVu7vHDpS1IqBRU7kCs2q:m3Q9j53xVu7vHhqBa4Cs
Behavioral task
behavioral1
Sample
JaffaCakes118_54fd1c1af0f12d1ff54ab8901e9ce266.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.0
Chrome
live.nodenet.ml:8863
754ce6d6-f75b-4c6f-964c-3996e749369e
-
encryption_key
8F8DE0B9E0A9CA156684061043456EC2CF7D0A6D
-
install_name
chrome.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System
-
subdirectory
chrome
Targets
-
-
Target
JaffaCakes118_54fd1c1af0f12d1ff54ab8901e9ce266
-
Size
6.6MB
-
MD5
54fd1c1af0f12d1ff54ab8901e9ce266
-
SHA1
f50e95582506de109115a2d46c9d2fae6caa238d
-
SHA256
c563c2586cc408faf2c05f25fcddb9049e8432d76f6fea16556f75d6ad380ce3
-
SHA512
21c45d652b2433a9ecc042bec756708e94dd7b648187d24efd178e0eae639e7a541cfe83cca443204cd1dd95e3e6b0b1cd7d62b495efa02cf073b9a4a2628c26
-
SSDEEP
196608:m+AJG9mLg53HRVu7vHDpS1IqBRU7kCs2q:m3Q9j53xVu7vHhqBa4Cs
-
Quasar family
-
Quasar payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-