General
-
Target
Build.exe
-
Size
15KB
-
Sample
240529-jldxaafe2t
-
MD5
27275853bd5996fb2f3767772d068d56
-
SHA1
14fb4c3c74870f14af8c4cd7c8eafa81c99c70c2
-
SHA256
abe621c37b2e40f6c6b3d9da15e37d4001188e10bac99e5d66c23cee23b98d03
-
SHA512
7e05ec050eaea236c04d74042ac1b2d5634e2be0dd3b8807bada25c38f2f758de9cc25d69fcfd5086b949dc74b97ad2401bce9e6db541153cec60e33024cc887
-
SSDEEP
384:twpcZrxSdohsUVdko8bxjsCa2txgb6P/sxErmM8/ANWUh:mpSk8VOfb2M669Sct
Static task
static1
Behavioral task
behavioral1
Sample
Build.exe
Resource
win7-20231129-en
Malware Config
Extracted
quasar
1.4.1
Office04
31.177.108.29:4782
553dcf2c-4c70-4c0c-935a-2e078a46f03e
-
encryption_key
DAFF70D249B4EC619D5A052FDD3418E3549FF268
-
install_name
KR6nDu9fLhop1bFe.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Defender.Process
-
subdirectory
SubDir
Targets
-
-
Target
Build.exe
-
Size
15KB
-
MD5
27275853bd5996fb2f3767772d068d56
-
SHA1
14fb4c3c74870f14af8c4cd7c8eafa81c99c70c2
-
SHA256
abe621c37b2e40f6c6b3d9da15e37d4001188e10bac99e5d66c23cee23b98d03
-
SHA512
7e05ec050eaea236c04d74042ac1b2d5634e2be0dd3b8807bada25c38f2f758de9cc25d69fcfd5086b949dc74b97ad2401bce9e6db541153cec60e33024cc887
-
SSDEEP
384:twpcZrxSdohsUVdko8bxjsCa2txgb6P/sxErmM8/ANWUh:mpSk8VOfb2M669Sct
-
Quasar payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-