General
-
Target
JaffaCakes118_65682f641bbadc15ac3eec442feb4f41
-
Size
399KB
-
Sample
250107-qn6hmssqbw
-
MD5
65682f641bbadc15ac3eec442feb4f41
-
SHA1
5115cdffb6cdae8f475c901514d67556a1c5b797
-
SHA256
2c7a657dfbea9c247ca711eb7e6e15387e0f4d502342f586689b8de8de3aad5d
-
SHA512
d63e86b9099f4c43c8b24ba25773d57501318211b0209f2ca9ddda9e3e0803885bfd641314707c1f2ee1d876b15090c1535a7766f2526690aff046f50ff088b4
-
SSDEEP
12288:hG9b2kkxA7FdnVS/pe9kfM9IWRTB1B/00:h3RAJJM/pRsIWRT9/00
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_65682f641bbadc15ac3eec442feb4f41.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.3.0.0
Criok
ildriendfrirotoi.zapto.org:61790
fruitingsuccess.ignorelist.com:61789
QSR_MUTEX_JS7TIscSksvJKrLXxw
-
encryption_key
7RWfQmQNDJPIz1c1QtI1
-
install_name
Updater.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Update
-
subdirectory
Windows
Extracted
latentbot
ildriendfrirotoi.zapto.org
Targets
-
-
Target
JaffaCakes118_65682f641bbadc15ac3eec442feb4f41
-
Size
399KB
-
MD5
65682f641bbadc15ac3eec442feb4f41
-
SHA1
5115cdffb6cdae8f475c901514d67556a1c5b797
-
SHA256
2c7a657dfbea9c247ca711eb7e6e15387e0f4d502342f586689b8de8de3aad5d
-
SHA512
d63e86b9099f4c43c8b24ba25773d57501318211b0209f2ca9ddda9e3e0803885bfd641314707c1f2ee1d876b15090c1535a7766f2526690aff046f50ff088b4
-
SSDEEP
12288:hG9b2kkxA7FdnVS/pe9kfM9IWRTB1B/00:h3RAJJM/pRsIWRT9/00
-
Latentbot family
-
Quasar family
-
Quasar payload
-
System Binary Proxy Execution: InstallUtil
Abuse InstallUtil to proxy execution of malicious code.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-