General
-
Target
JaffaCakes118_dc341a4899e1a077f128b79dbe296954
-
Size
6.0MB
-
Sample
250110-f9bkaatnct
-
MD5
dc341a4899e1a077f128b79dbe296954
-
SHA1
e1f1e167595b85784a78f2c3902a4e57082daff9
-
SHA256
c846b98acb1e0423fa8b07228f06e3816cd0d5c8c076ff8c847622731aec5562
-
SHA512
978acecbb0cc55a3e8ede7ef78572e3c09ae42553a01de3e82ac8a5f085a937a43f90f0acabf2cfa80e05b1a570c05c41191cc5f76b03492cdfc9c6a2445f949
-
SSDEEP
196608:HS35uBog53HRVu7vHDpS1IqBRU7kCs2q:HS3YBr53xVu7vHhqBa4Cs
Behavioral task
behavioral1
Sample
JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.0
Chrome
live.nodenet.ml:8863
754ce6d6-f75b-4c6f-964c-3996e749369e
-
encryption_key
8F8DE0B9E0A9CA156684061043456EC2CF7D0A6D
-
install_name
chrome.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System
-
subdirectory
chrome
Targets
-
-
Target
JaffaCakes118_dc341a4899e1a077f128b79dbe296954
-
Size
6.0MB
-
MD5
dc341a4899e1a077f128b79dbe296954
-
SHA1
e1f1e167595b85784a78f2c3902a4e57082daff9
-
SHA256
c846b98acb1e0423fa8b07228f06e3816cd0d5c8c076ff8c847622731aec5562
-
SHA512
978acecbb0cc55a3e8ede7ef78572e3c09ae42553a01de3e82ac8a5f085a937a43f90f0acabf2cfa80e05b1a570c05c41191cc5f76b03492cdfc9c6a2445f949
-
SSDEEP
196608:HS35uBog53HRVu7vHDpS1IqBRU7kCs2q:HS3YBr53xVu7vHhqBa4Cs
-
Quasar family
-
Quasar payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-