General
-
Target
e862112b0a3781dcf75eaf11b8b6ea7d.bin
-
Size
4.3MB
-
Sample
230525-ccn8bsgb8v
-
MD5
3351763c12fd12f4468a7eb76156c5ff
-
SHA1
c07d054d71159f800426c1a51681057730af45fa
-
SHA256
1f3f243a8fbc3468bbdd7abdf0f2d1b91e8cf8a3cecb8db1bfbe5fa6288809bd
-
SHA512
fbb7440b575079b378377f35de339badc3478e27d890c0ded0518e4c697e394f32c421a63dbc17e8c68bace76525ce59b4d7a95b5ed6b18e65fa321997a7434f
-
SSDEEP
98304:8kvf8vBvqzTC4tHUASP/KlKgSCt4MbLDVJuMamOH8a8wKPkwO/Kj:/vkJvIQAc/gSGMMamBajyj
Static task
static1
Behavioral task
behavioral1
Sample
5b1365bd1c3648fdfe1aa9699e1647b3967bf3824c0b03eb4e67ef4599840135.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5b1365bd1c3648fdfe1aa9699e1647b3967bf3824c0b03eb4e67ef4599840135.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
quasar
1.4.1
Office04
microsoftbackup.duckdns.org:47600
b97303a2-a8f5-4170-91c1-56adceee5081
-
encryption_key
A31E078A7CC45D3676D5AE3FB460C3E365219397
-
install_name
Client.exe
-
log_directory
Log
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
5b1365bd1c3648fdfe1aa9699e1647b3967bf3824c0b03eb4e67ef4599840135.exe
-
Size
4.4MB
-
MD5
e862112b0a3781dcf75eaf11b8b6ea7d
-
SHA1
725b9a18c2c6cdd616ad10d6f9e977753c7eb0e4
-
SHA256
5b1365bd1c3648fdfe1aa9699e1647b3967bf3824c0b03eb4e67ef4599840135
-
SHA512
6a5ebf286858e2a814fedf81fae111bd4468eaafe19ecc2a7eadf2d441b9584bab4ee4a3c5f83415d5cc31bbe11f7888e6dbe2a0a8a006affaefe463de3f535f
-
SSDEEP
98304:+4uKDZOjVXFcG7BEcyZeW+gP/i6jepIA90sK6LovYr5K49ZQ:+4uKDeFT7BEcyZpDP/RERXKsog5BHQ
Score10/10-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-