General
-
Target
HEUR-Backdoor.MSIL.Quasar.gen-17f5902438ae8e7874be0cf1481d689b7cb4555934c0d48321ea085bee137248.exe
-
Size
144KB
-
Sample
221228-k9n8lahh36
-
MD5
7f7fa947c50c3f910aeb0ab971ddbe30
-
SHA1
fae2adb3424a82d8922e512b823bd85b9e1f9d00
-
SHA256
17f5902438ae8e7874be0cf1481d689b7cb4555934c0d48321ea085bee137248
-
SHA512
9966ea045c835e97c93e34f00708e9d1cc88053dd7eb36a0aafe80596f902a51868c6a43a818a3e79e1db341ce69708c0a61da16c4f0c630abaa46c8c7278388
-
SSDEEP
3072:TW9VDGgVRschltqD7J/+kD5f2VX7X9sYoo:i9VL0GlMD7ImfOXL9ko
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Backdoor.MSIL.Quasar.gen-17f5902438ae8e7874be0cf1481d689b7cb4555934c0d48321ea085bee137248.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
HEUR-Backdoor.MSIL.Quasar.gen-17f5902438ae8e7874be0cf1481d689b7cb4555934c0d48321ea085bee137248.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
quasar
1.4.0.0
Office04
primary-comment.at.playit.gg:29022
OxNTiA3vaw7DPYLLek
-
encryption_key
jhDT0w3MDDqnddR6Tjen
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
HEUR-Backdoor.MSIL.Quasar.gen-17f5902438ae8e7874be0cf1481d689b7cb4555934c0d48321ea085bee137248.exe
-
Size
144KB
-
MD5
7f7fa947c50c3f910aeb0ab971ddbe30
-
SHA1
fae2adb3424a82d8922e512b823bd85b9e1f9d00
-
SHA256
17f5902438ae8e7874be0cf1481d689b7cb4555934c0d48321ea085bee137248
-
SHA512
9966ea045c835e97c93e34f00708e9d1cc88053dd7eb36a0aafe80596f902a51868c6a43a818a3e79e1db341ce69708c0a61da16c4f0c630abaa46c8c7278388
-
SSDEEP
3072:TW9VDGgVRschltqD7J/+kD5f2VX7X9sYoo:i9VL0GlMD7ImfOXL9ko
Score10/10-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-