General
-
Target
382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3
-
Size
337KB
-
Sample
220625-zvgyaseac3
-
MD5
8674e8fd878a92e92a479b931235bb72
-
SHA1
dfc652402b4791b81379326b0881cd0a2e613169
-
SHA256
382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3
-
SHA512
6d36b398d1f964b3b2f0ce5fdd1a0a04e7997b8fa8295912f31d4e26a50dee75197303df34d92915fa5bb57a5df4d486dcff7d312bd5064425cd27218b4e094c
Static task
static1
Behavioral task
behavioral1
Sample
382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3.exe
Resource
win7-20220414-en
Malware Config
Extracted
quasar
1.4.0.0
CEO
23.249.161.211:1714
ymuFePGjPK2s7dyOvO
-
encryption_key
H5mirEGEuwM1G7u6Z7Pb
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3
-
Size
337KB
-
MD5
8674e8fd878a92e92a479b931235bb72
-
SHA1
dfc652402b4791b81379326b0881cd0a2e613169
-
SHA256
382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3
-
SHA512
6d36b398d1f964b3b2f0ce5fdd1a0a04e7997b8fa8295912f31d4e26a50dee75197303df34d92915fa5bb57a5df4d486dcff7d312bd5064425cd27218b4e094c
-
Quasar Payload
-
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Drops startup file
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-