Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
12-12-2023 17:40
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
34b6298d9defd63572face0b98890878
-
SHA1
805169e5782b01b2681eb43de1900063fe06e590
-
SHA256
aac3318a190c7dc53512c3b492cd1cd6849b5095fb1f112ba296f9c079194340
-
SHA512
4aeed4a6c14f1ecc739eb70512f435f1c4ee9c9e1de936c6e6817e9c5281aec486c35eb71ad70d68b03a4c8e813706395c80250c5e4880e9dacba15065a9dd79
-
SSDEEP
49152:uvbI22SsaNYfdPBldt698dBcjHUQxNESEpk/iKLoGdfTHHB72eh2NT:uvk22SsaNYfdPBldt6+dBcjH/xg0
Malware Config
Extracted
Family
quasar
Version
1.4.1
Botnet
Office04
C2
91.92.242.148:4782
Mutex
19d192fd-6b6a-462a-816d-c6a2102fb462
Attributes
-
encryption_key
5E1B833088E17261392F4E2B5745DF67141AEEA1
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/2376-0-0x0000000000920000-0x0000000000C44000-memory.dmp family_quasar -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2376 Client-built.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 Client-built.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2376 Client-built.exe