General
-
Target
Pago.exe
-
Size
1.3MB
-
Sample
221123-j1jq3sbf7z
-
MD5
ce7d806c0c013d7a322071cb5e9d3ab7
-
SHA1
becd8d9257efa5df71f3a49edb5ea07da0511755
-
SHA256
f47fae36937dabb1c97098581deb76302b10f5abdf77971626813dd158af341c
-
SHA512
c84c4c99cf9b986c06208ea6a283f5de67dd38f65d1344b9b7d03ce1ea19f03aa67c8467e0e454febc7532b4e82ccf908c73c740f2f54eb32cf13cddf14544ec
-
SSDEEP
24576:rGHCm8uPdJAg804Aa24gOYtHzl0GXtiHpH1uYIq3U/l5MHTU:quWpZt51oJklCzU
Static task
static1
Behavioral task
behavioral1
Sample
Pago.exe
Resource
win7-20221111-en
Malware Config
Extracted
quasar
1.3.0.0
yop
dnuocc.com:64594
www.dnuocc.com:64594
QSR_MUTEX_OyCjWKeFudCMEKYeJX
-
encryption_key
In08tDaU6GKdLZ8HdsU1
-
install_name
yors.exe
-
log_directory
Logs
-
reconnect_delay
7000
-
startup_key
crdm
-
subdirectory
yilk
Targets
-
-
Target
Pago.exe
-
Size
1.3MB
-
MD5
ce7d806c0c013d7a322071cb5e9d3ab7
-
SHA1
becd8d9257efa5df71f3a49edb5ea07da0511755
-
SHA256
f47fae36937dabb1c97098581deb76302b10f5abdf77971626813dd158af341c
-
SHA512
c84c4c99cf9b986c06208ea6a283f5de67dd38f65d1344b9b7d03ce1ea19f03aa67c8467e0e454febc7532b4e82ccf908c73c740f2f54eb32cf13cddf14544ec
-
SSDEEP
24576:rGHCm8uPdJAg804Aa24gOYtHzl0GXtiHpH1uYIq3U/l5MHTU:quWpZt51oJklCzU
-
Quasar payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-