General
-
Target
JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365
-
Size
6.0MB
-
Sample
250109-x1l34aykb1
-
MD5
d04352c69e8d56db5f9eb8f0b6573365
-
SHA1
21d7ec8a608f26756eb8531f3d51f7e0a63f7d8d
-
SHA256
40f9ef6921839b83373e8d981655b24f2b9c6d9b5b342d2bf621c8d6ea5528f8
-
SHA512
b341b0e0eeb9031ed17dcc490b6bbb74fb3f6b563a09c66ce59acc002967a86719d7ac1e31b30068277be0448672a35a330271ac74b032f6216e8fc93160ce41
-
SSDEEP
98304:blFqmwupyhcHp5ooEAnHRVN07KgHDpS18DqBRe7qxKfT1J+tNY3LU4rI2qo:bWJuMg53HRVu7vHDpS1IqBRU7kCs2q
Behavioral task
behavioral1
Sample
JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.0
Chrome
live.nodenet.ml:8863
754ce6d6-f75b-4c6f-964c-3996e749369e
-
encryption_key
8F8DE0B9E0A9CA156684061043456EC2CF7D0A6D
-
install_name
chrome.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System
-
subdirectory
chrome
Targets
-
-
Target
JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365
-
Size
6.0MB
-
MD5
d04352c69e8d56db5f9eb8f0b6573365
-
SHA1
21d7ec8a608f26756eb8531f3d51f7e0a63f7d8d
-
SHA256
40f9ef6921839b83373e8d981655b24f2b9c6d9b5b342d2bf621c8d6ea5528f8
-
SHA512
b341b0e0eeb9031ed17dcc490b6bbb74fb3f6b563a09c66ce59acc002967a86719d7ac1e31b30068277be0448672a35a330271ac74b032f6216e8fc93160ce41
-
SSDEEP
98304:blFqmwupyhcHp5ooEAnHRVN07KgHDpS18DqBRe7qxKfT1J+tNY3LU4rI2qo:bWJuMg53HRVu7vHDpS1IqBRU7kCs2q
-
Quasar family
-
Quasar payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-