General
-
Target
taskhosts-cleaned.exe
-
Size
385KB
-
Sample
230624-ze5z7add5y
-
MD5
6e5babe25aad66144dd2e15ab97bd38b
-
SHA1
61d589a0814a1ef9a0b1a06454f9761fe81ddbff
-
SHA256
fbbb647aeb0707b5897f74bc3616b275406c6fce1ac0409a6f582fdfcc2de147
-
SHA512
6547309b05f1ffec63c5ea9c92bb536d37ca1b7104df936324ba19dfb53dff0aa9135f3a9bd4aa0ae46a210048db9b5694424e00bd47e2cb2ab63df5a4f52896
-
SSDEEP
6144:F8jlR5z3XxhxrL8rK/A0j1/zTzTLNozbLRpw34urkR10efUK0:FMlHzHxhV/Aqipw3XQztfK
Behavioral task
behavioral1
Sample
taskhosts-cleaned.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
taskhosts-cleaned.exe
Resource
win10v2004-20230621-en
Malware Config
Extracted
quasar
1.4.0.0
Down
simplmizer.duckdns.org:1337
rhoc35VS3mkrMtkPb1
-
encryption_key
AN1JmoUwwzfA1Metx4Ze
-
install_name
taskhost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
EdgeBrowser
-
subdirectory
SubDir
Targets
-
-
Target
taskhosts-cleaned.exe
-
Size
385KB
-
MD5
6e5babe25aad66144dd2e15ab97bd38b
-
SHA1
61d589a0814a1ef9a0b1a06454f9761fe81ddbff
-
SHA256
fbbb647aeb0707b5897f74bc3616b275406c6fce1ac0409a6f582fdfcc2de147
-
SHA512
6547309b05f1ffec63c5ea9c92bb536d37ca1b7104df936324ba19dfb53dff0aa9135f3a9bd4aa0ae46a210048db9b5694424e00bd47e2cb2ab63df5a4f52896
-
SSDEEP
6144:F8jlR5z3XxhxrL8rK/A0j1/zTzTLNozbLRpw34urkR10efUK0:FMlHzHxhV/Aqipw3XQztfK
Score10/10-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-