Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2023 19:02
Behavioral task
behavioral1
Sample
stub.exe
Resource
win7-20230220-en
windows7-x64
5 signatures
150 seconds
General
-
Target
stub.exe
-
Size
348KB
-
MD5
46b23e41aeba2bb731b8ae3e22a7e5dc
-
SHA1
a180b34c6f9cc519d1d3773904c56c3d952ca423
-
SHA256
c8277e88b37878917b46d509324a57846d58e285c3e06720a282e7bb34fd9bc0
-
SHA512
9387f05ce259a39be1a194fbb4a89747d4005866bfddfec2a5605437b899563f7bc5c4af2231f8bc76934ecbabc15ea1596c0c5d70a4207390be13cc6d95d176
-
SSDEEP
6144:+2NHXf500MGQqCgPsccwxdbNNepgFVswka:1d50yzVteGjswka
Malware Config
Extracted
Family
quasar
Version
1.3.0.0
Botnet
new2
C2
asyfguas.con-ip.com:555
Mutex
QSR_MUTEX_ehHHLz4QY25Plj0Xry
Attributes
-
encryption_key
SF8iuyfrBbCOUe75IKlr
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/3888-133-0x00000000008C0000-0x000000000091E000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3888 stub.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3888 stub.exe