General
-
Target
Contact Card.exe
-
Size
376KB
-
Sample
240105-1tmylabcgp
-
MD5
409b88b2b275353f2ca05983cef1abf5
-
SHA1
2fc14e18c0b090d55360e60468489aa65e2375f2
-
SHA256
d56dd549736bda8fd1ebc8ae17c0b642c1df0fb5ce5e824b723d9b3f29da38c3
-
SHA512
f2729c972505fb76df726b7fc44ce2f96831af4c37acd46dac640be32f9a43f4e32fbde1dbbf230b721bdabf421760e26324732f701491a22ab6962f2b63fbca
-
SSDEEP
6144:GI6bPXhLApfpebKxMZWnmaxv6prs9NNbgSWVGg9R+1FZ+UsukEXVX:7mhApDmWhIVGg9R+1FPsukEB
Behavioral task
behavioral1
Sample
Contact Card.exe
Resource
win7-20231215-en
Malware Config
Extracted
quasar
1.3.0.0
John
202.2.12.13:4782
QSR_MUTEX_CxO1HuVkIgYkhY4NA9
-
encryption_key
s52dOq4uyyE0qGeD9OKm
-
install_name
updater.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java updater
-
subdirectory
Java
Targets
-
-
Target
Contact Card.exe
-
Size
376KB
-
MD5
409b88b2b275353f2ca05983cef1abf5
-
SHA1
2fc14e18c0b090d55360e60468489aa65e2375f2
-
SHA256
d56dd549736bda8fd1ebc8ae17c0b642c1df0fb5ce5e824b723d9b3f29da38c3
-
SHA512
f2729c972505fb76df726b7fc44ce2f96831af4c37acd46dac640be32f9a43f4e32fbde1dbbf230b721bdabf421760e26324732f701491a22ab6962f2b63fbca
-
SSDEEP
6144:GI6bPXhLApfpebKxMZWnmaxv6prs9NNbgSWVGg9R+1FZ+UsukEXVX:7mhApDmWhIVGg9R+1FPsukEB
Score10/10-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-