General
-
Target
5aa187357d7fd3e33f6f6780809f14f33d2808f8510d0c4ba63952c8574410e6
-
Size
1.3MB
-
Sample
220525-ay2z7sdda4
-
MD5
289b643e1a46d2b8de76323db780b6cf
-
SHA1
ef7ff8a8a634319e57043a35a9c3a9aa062f8a93
-
SHA256
5aa187357d7fd3e33f6f6780809f14f33d2808f8510d0c4ba63952c8574410e6
-
SHA512
6353d2a666d5b99d9e6e22cbe9fafb4a0640ade812c3c613bde47ceea612eefc5ef835051b88163edad7a8a49b861ee8847f5a663a9b1049b5578293ccb74a04
Static task
static1
Behavioral task
behavioral1
Sample
5aa187357d7fd3e33f6f6780809f14f33d2808f8510d0c4ba63952c8574410e6.exe
Resource
win7-20220414-en
Malware Config
Extracted
quasar
1.4.0.0
Office
46.249.59.99:111
mz2wiNFAWq1HjJ2fUn
-
encryption_key
8DIs0SbdWcImnvHm2I9I
-
install_name
csrss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
NET framework
-
subdirectory
SubDir
Targets
-
-
Target
5aa187357d7fd3e33f6f6780809f14f33d2808f8510d0c4ba63952c8574410e6
-
Size
1.3MB
-
MD5
289b643e1a46d2b8de76323db780b6cf
-
SHA1
ef7ff8a8a634319e57043a35a9c3a9aa062f8a93
-
SHA256
5aa187357d7fd3e33f6f6780809f14f33d2808f8510d0c4ba63952c8574410e6
-
SHA512
6353d2a666d5b99d9e6e22cbe9fafb4a0640ade812c3c613bde47ceea612eefc5ef835051b88163edad7a8a49b861ee8847f5a663a9b1049b5578293ccb74a04
-
Quasar Payload
-
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-