General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
240426-vq7wpsgc64
-
MD5
1fb05ef820095ff5e3e2b983f961ab7d
-
SHA1
7bcf182863f90623cbf6d421edf4ef140d7088a1
-
SHA256
6cf21856443fdd0c0c6e9b65bd641b3d20449f54247010899d2dcfbadeecce73
-
SHA512
c2c1191023fde2bed2c53e8a643fc99832aa7b2ee3e7be5f54a423123db0f22ea2d9f67dac924116eedfdadf93ee29c79a9945999cd06e30ee7c976653cb7bb7
-
SSDEEP
49152:ivBt62XlaSFNWPjljiFa2RoUYIR/xNESEmk/iiLoGdUTHHB72eh2NT:ivr62XlaSFNWPjljiFXRoUYIhxRs
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240419-en
Malware Config
Extracted
quasar
1.4.1
office
2.tcp.eu.ngrok.io:16096
755f883f-4d58-4349-bc9e-f21c4e163b6f
-
encryption_key
EE65D8F2E429F4900E3A17963595716D863A2455
-
install_name
office.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
office startup
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
1fb05ef820095ff5e3e2b983f961ab7d
-
SHA1
7bcf182863f90623cbf6d421edf4ef140d7088a1
-
SHA256
6cf21856443fdd0c0c6e9b65bd641b3d20449f54247010899d2dcfbadeecce73
-
SHA512
c2c1191023fde2bed2c53e8a643fc99832aa7b2ee3e7be5f54a423123db0f22ea2d9f67dac924116eedfdadf93ee29c79a9945999cd06e30ee7c976653cb7bb7
-
SSDEEP
49152:ivBt62XlaSFNWPjljiFa2RoUYIR/xNESEmk/iiLoGdUTHHB72eh2NT:ivr62XlaSFNWPjljiFXRoUYIhxRs
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-