General
-
Target
JaffaCakes118_b1ff77998952464295aa1e03ff663bc1
-
Size
8.0MB
-
Sample
250108-27vq2axnhw
-
MD5
b1ff77998952464295aa1e03ff663bc1
-
SHA1
c9bbb2e532e2bf985d9b0d0714f4c0863988cb1f
-
SHA256
4c321dbc58bd6f4b3f63985cc01776cc0837bda5afacd41ed60621055839ac40
-
SHA512
41cade9f993a1c7051bed07d8b04574572c00ec5dd54c65fe70e641ee7a12fd05db6da6aaf0f6629886b54cd045a0c659d328cee42a5e7f3c6d2b679ef201f75
-
SSDEEP
49152:jCixMQg3Q3cX5C/wnvdAlPjcmYeuc8gFdbkLUtJd4Bg1S1Cqfo2FForB4nMJnBy1:jC8LA
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b1ff77998952464295aa1e03ff663bc1.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
2.8.0.1
VenomTest
2.tcp.ngrok.io:10499
aQnrmLl26xZY2XjKa4
-
encryption_key
gEu4ClJ02hFf38qGEVYN
-
install_name
Venom.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
Targets
-
-
Target
JaffaCakes118_b1ff77998952464295aa1e03ff663bc1
-
Size
8.0MB
-
MD5
b1ff77998952464295aa1e03ff663bc1
-
SHA1
c9bbb2e532e2bf985d9b0d0714f4c0863988cb1f
-
SHA256
4c321dbc58bd6f4b3f63985cc01776cc0837bda5afacd41ed60621055839ac40
-
SHA512
41cade9f993a1c7051bed07d8b04574572c00ec5dd54c65fe70e641ee7a12fd05db6da6aaf0f6629886b54cd045a0c659d328cee42a5e7f3c6d2b679ef201f75
-
SSDEEP
49152:jCixMQg3Q3cX5C/wnvdAlPjcmYeuc8gFdbkLUtJd4Bg1S1Cqfo2FForB4nMJnBy1:jC8LA
-
Quasar family
-
Quasar payload
-
Adds Run key to start application
-