General
-
Target
Client-built.exe
-
Size
348KB
-
Sample
240412-xkwbtsda74
-
MD5
46c2a971cec1f82ea7a338ab4a368f37
-
SHA1
69b181896b53a27554a6535f61e1b1e785750f98
-
SHA256
04b8bb3fc2b3311f5027fa536ec480a3211cbc4673efde460f59daf44a7a1f55
-
SHA512
627ea3b4f030dc62fa13b8902dbc6d6e286e8ba93b08ae584f37d8dcc9933dfbe84dd27241510dd821bd58bb8f8621399cb85c4e35b35d7424c1e7be141fd80f
-
SSDEEP
6144:MMNHXf500MOxK7ACSBybr7bbVJG6rCaI4CH0KM+:Zd50awACBlo6rPXCHs+
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
quasar
1.3.0.0
Office04
Lunasplanet-29399.portmap.host:29399
QSR_MUTEX_3gXoc7Rbb6gDK9k7Ha
-
encryption_key
huAtWMa1sVtLD6rMH8Yv
-
install_name
SubClient.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SubClient.exe
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
348KB
-
MD5
46c2a971cec1f82ea7a338ab4a368f37
-
SHA1
69b181896b53a27554a6535f61e1b1e785750f98
-
SHA256
04b8bb3fc2b3311f5027fa536ec480a3211cbc4673efde460f59daf44a7a1f55
-
SHA512
627ea3b4f030dc62fa13b8902dbc6d6e286e8ba93b08ae584f37d8dcc9933dfbe84dd27241510dd821bd58bb8f8621399cb85c4e35b35d7424c1e7be141fd80f
-
SSDEEP
6144:MMNHXf500MOxK7ACSBybr7bbVJG6rCaI4CH0KM+:Zd50awACBlo6rPXCHs+
-
Quasar payload
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-