General
-
Target
https://drive.google.com/file/d/11Nff_nSTj-qAFgshL0mhor7fJP9kHxH0/view?usp=drive_web
-
Sample
240515-szw5fsgb53
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/11Nff_nSTj-qAFgshL0mhor7fJP9kHxH0/view?usp=drive_web
Resource
win10v2004-20240508-en
windows10-2004-x64
15 signatures
150 seconds
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
https://pasteio.com/download/xcxWvykfm30a
Extracted
Family
quasar
Version
1.4.1
Botnet
aldo_R3GON
C2
peurnick24.bumbleshrimp.com:7310
Mutex
77413eeb-5d1c-4bf8-986f-3c9d48a16cd6
Attributes
-
encryption_key
A3226D93494A561FEC5149605B952B09B55012C6
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
https://drive.google.com/file/d/11Nff_nSTj-qAFgshL0mhor7fJP9kHxH0/view?usp=drive_web
Score10/10-
Quasar payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-