General
-
Target
JaffaCakes118_e82e07a2f06226989c2864557311d904
-
Size
6.3MB
-
Sample
250110-tbrqha1nfl
-
MD5
e82e07a2f06226989c2864557311d904
-
SHA1
1b5efe272bcc5fd95f4cae034995fc3b795d3416
-
SHA256
2602948e0301d266cd808c4b9d8bbe75dee0025686b603b2c321d6e97c5f2cc5
-
SHA512
f43124a0f4cff06fb31450dece6d21394a1817b56d50b2988338b1295ea963b9bc9405d4691a926c7179ddb785d67e01f4bfb74044e8fcf2db0f361bbde3f62d
-
SSDEEP
98304:P3c+RXz2LmThcHp5ooEAnHRVN07KgHDpS18DqBRe7qxKfT1J+tNY3LU4rI2qoP:rRfg53HRVu7vHDpS1IqBRU7kCs2q
Behavioral task
behavioral1
Sample
JaffaCakes118_e82e07a2f06226989c2864557311d904.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.0
Word
live.nodenet.ml:8863
754ce6d6-f75b-4c6f-964c-3996e749369e
-
encryption_key
8F8DE0B9E0A9CA156684061043456EC2CF7D0A6D
-
install_name
Word.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System
-
subdirectory
WordW
Targets
-
-
Target
JaffaCakes118_e82e07a2f06226989c2864557311d904
-
Size
6.3MB
-
MD5
e82e07a2f06226989c2864557311d904
-
SHA1
1b5efe272bcc5fd95f4cae034995fc3b795d3416
-
SHA256
2602948e0301d266cd808c4b9d8bbe75dee0025686b603b2c321d6e97c5f2cc5
-
SHA512
f43124a0f4cff06fb31450dece6d21394a1817b56d50b2988338b1295ea963b9bc9405d4691a926c7179ddb785d67e01f4bfb74044e8fcf2db0f361bbde3f62d
-
SSDEEP
98304:P3c+RXz2LmThcHp5ooEAnHRVN07KgHDpS18DqBRe7qxKfT1J+tNY3LU4rI2qoP:rRfg53HRVu7vHDpS1IqBRU7kCs2q
-
Quasar family
-
Quasar payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-