General
-
Target
SMSS.exe
-
Size
3.1MB
-
Sample
231121-vcsjvsgd7t
-
MD5
e13a0155794d4a05bc89613791380236
-
SHA1
d99af2c2846e0c8f4b557903df9b4c1a87585bf6
-
SHA256
5b76a4dbfc0d08d90ce4b0ad4ab6374d0590cb89d369d1cc885bd9be7efb5a6d
-
SHA512
54657d4d3959c33ec8ce6d3e983c05b27aae4081aec9f78c79d9ab16c86c9f052354784e9a8cc8c31482c37eeea402b28d4dfabce68e9ee5d57e534cbeb1929e
-
SSDEEP
49152:HvnI22SsaNYfdPBldt698dBcjH4WRJ6cbR3LoGd/THHB72eh2NT:HvI22SsaNYfdPBldt6+dBcjH4WRJ6m
Malware Config
Extracted
quasar
1.4.1
Pon
7.tcp.eu.ngrok.io:12225
5e9a9d41-187d-4dbc-b58d-2d437b9805a5
-
encryption_key
000B0FC52B6272482F163898894B0BB6D8795F55
-
install_name
smss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
RealSMSS
Targets
-
-
Target
SMSS.exe
-
Size
3.1MB
-
MD5
e13a0155794d4a05bc89613791380236
-
SHA1
d99af2c2846e0c8f4b557903df9b4c1a87585bf6
-
SHA256
5b76a4dbfc0d08d90ce4b0ad4ab6374d0590cb89d369d1cc885bd9be7efb5a6d
-
SHA512
54657d4d3959c33ec8ce6d3e983c05b27aae4081aec9f78c79d9ab16c86c9f052354784e9a8cc8c31482c37eeea402b28d4dfabce68e9ee5d57e534cbeb1929e
-
SSDEEP
49152:HvnI22SsaNYfdPBldt698dBcjH4WRJ6cbR3LoGd/THHB72eh2NT:HvI22SsaNYfdPBldt6+dBcjH4WRJ6m
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-