General
-
Target
3HkvftGZK9KZ.exe
-
Size
1.3MB
-
Sample
221011-l798qahef9
-
MD5
6ef27bb17948bf2cd5f17d32506ab25f
-
SHA1
1cace02f54cb1696be68e2ee291e26c051293a51
-
SHA256
4a412162a0b00623211b7303bc18b00b76d196ea8343a2c35abc262e9e97c9b2
-
SHA512
38d33e4f1d445ddbb5a45be34f369e60b22f5c29733e3acec9b156851e8494cd5845d22b2c71794b51c2ae73a890685f35dc1738c0e706f8b93c2272545885de
-
SSDEEP
24576:0KWHORcD/gtB49yDx553XTWcdjrFY5des+Lpq1qe9UdaRkss0:MHMRBO4TxXTLtLpqjOd+kss
Static task
static1
Behavioral task
behavioral1
Sample
3HkvftGZK9KZ.exe
Resource
win7-20220812-en
Malware Config
Extracted
quasar
-
reconnect_delay
3000
Extracted
quasar
1.4.0
Office04
173.225.115.99:7702
ecce8627-6b34-425d-8f0e-3a8923c66220
-
encryption_key
F04A75E6507173FAEEC2BB82C564030A5E8413FF
-
install_name
ser.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
quar
Extracted
limerat
-
aes_key
082808
-
antivm
true
-
c2_url
https://pastebin.com/raw/Mh8T0LJe
-
delay
6
-
download_payload
false
-
install
true
-
install_name
limo.exe
-
main_folder
Temp
-
payload_url
https://mdl.arabou.edu.kw/ksa/user/profile/field/text/lang/en/VB64.exe
-
pin_spread
true
-
sub_folder
\Windows\
-
usb_spread
true
Targets
-
-
Target
3HkvftGZK9KZ.exe
-
Size
1.3MB
-
MD5
6ef27bb17948bf2cd5f17d32506ab25f
-
SHA1
1cace02f54cb1696be68e2ee291e26c051293a51
-
SHA256
4a412162a0b00623211b7303bc18b00b76d196ea8343a2c35abc262e9e97c9b2
-
SHA512
38d33e4f1d445ddbb5a45be34f369e60b22f5c29733e3acec9b156851e8494cd5845d22b2c71794b51c2ae73a890685f35dc1738c0e706f8b93c2272545885de
-
SSDEEP
24576:0KWHORcD/gtB49yDx553XTWcdjrFY5des+Lpq1qe9UdaRkss0:MHMRBO4TxXTLtLpqjOd+kss
-
Quasar payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-