General
-
Target
msjO.hta
-
Size
62KB
-
Sample
231012-pjwxzaca66
-
MD5
da5de2b74995076618fe814857073997
-
SHA1
2891a832f6f327a77b5bf8280c13fce76e35b7fe
-
SHA256
ae8c4f72c13b4103e0e977bbf2939a4b97860d1c279994d1b0bd27e00cbf8c2f
-
SHA512
74e31514a029f9577cf084a0a040f7bc56706f90afd0a079f8e5f56e024b2c2f7f8a6cc8f8a4d9ac70dd07eb4d8b48987a8ad4a784f3d883e484015c63bd595d
-
SSDEEP
768:8lxvAqQiY1Qgph+3/ziRGrirzlQj3KIbd7RJSAIjK+4mmLFpLgZakmM:8xvAqQiSphvrCj3KIbd7RFxdBpMdmM
Static task
static1
Behavioral task
behavioral1
Sample
msjO.hta
Resource
win7-20230831-en
Malware Config
Extracted
quasar
1.4.1
Cashing
185.17.0.246:1419
e32b7ac6-a9bd-4f6a-a9c2-2187fa77e95c
-
encryption_key
CE9D5068446A3372A70ABE8EBD0D7F0CBC814B08
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Targets
-
-
Target
msjO.hta
-
Size
62KB
-
MD5
da5de2b74995076618fe814857073997
-
SHA1
2891a832f6f327a77b5bf8280c13fce76e35b7fe
-
SHA256
ae8c4f72c13b4103e0e977bbf2939a4b97860d1c279994d1b0bd27e00cbf8c2f
-
SHA512
74e31514a029f9577cf084a0a040f7bc56706f90afd0a079f8e5f56e024b2c2f7f8a6cc8f8a4d9ac70dd07eb4d8b48987a8ad4a784f3d883e484015c63bd595d
-
SSDEEP
768:8lxvAqQiY1Qgph+3/ziRGrirzlQj3KIbd7RJSAIjK+4mmLFpLgZakmM:8xvAqQiSphvrCj3KIbd7RFxdBpMdmM
-
Quasar payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-