General
-
Target
Runtimes.exe
-
Size
506KB
-
Sample
230307-xnxn3aag7x
-
MD5
0d5bd8080ffea16a28c91cacf5b532d4
-
SHA1
a7b23b3e075d9c6e338a0c9f9e95d59c706e8f73
-
SHA256
0d69a444fa9c4b6fe43db02f63cb7fa91ba1ab7f1161b8ad660706853955e83e
-
SHA512
3ad95044b6d285c9b59e39969b082a87a35721b01ea15565c6ded2f936ba12905be5a1a02e88ee6d75e94492414329e116c7cd8323241381d4cac4865d4a242b
-
SSDEEP
6144:BTEgdc0Y2X7IxUpGREWLOHAZTPwbb2cEFEb8F9omJhAn9AucTR3i:BTEgdfYXxU2G21PKOhwcdi
Behavioral task
behavioral1
Sample
Runtimes.exe
Resource
win7-20230220-en
Malware Config
Extracted
quasar
1.4.0
Office04
0.tcp.ngrok.io:12508
43d3e5de-3573-4168-9254-edea557688f4
-
encryption_key
ACAA20F8D9EB02A78F450224DE77825C125872E8
-
install_name
Runtimes.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Cortana
-
subdirectory
SubDir
Targets
-
-
Target
Runtimes.exe
-
Size
506KB
-
MD5
0d5bd8080ffea16a28c91cacf5b532d4
-
SHA1
a7b23b3e075d9c6e338a0c9f9e95d59c706e8f73
-
SHA256
0d69a444fa9c4b6fe43db02f63cb7fa91ba1ab7f1161b8ad660706853955e83e
-
SHA512
3ad95044b6d285c9b59e39969b082a87a35721b01ea15565c6ded2f936ba12905be5a1a02e88ee6d75e94492414329e116c7cd8323241381d4cac4865d4a242b
-
SSDEEP
6144:BTEgdc0Y2X7IxUpGREWLOHAZTPwbb2cEFEb8F9omJhAn9AucTR3i:BTEgdfYXxU2G21PKOhwcdi
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-