General
-
Target
Beta.exe
-
Size
3.1MB
-
Sample
240530-p8bnbsae68
-
MD5
bb26a2979d9a61725f910422403ed4dd
-
SHA1
b46d4a3a7f7253e1d7268c060702d301ebb36dd6
-
SHA256
fb80d28a129184b6a273bd893aeee80765b6ec3eb617d90c6d32d0738bcbbfef
-
SHA512
dfa1d068282cae728f6adf890065c0dcecbf9215646f50313d995afd209f52c07f3fd8e1e414c8712af1e2b5306ef453a9b6419f1c574dbd445acbc276426200
-
SSDEEP
49152:ivEt62XlaSFNWPjljiFa2RoUYI9ihqKhHvJQMoGd9THHB72eh2NT:ivY62XlaSFNWPjljiFXRoUYImh5
Behavioral task
behavioral1
Sample
Beta.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
1.4.1
Astro-1
arthurus36.duckdns.org:5555
ad7cd985-5e2e-45a3-9246-b82449c7c4d8
-
encryption_key
6314C8C60AA1035CEB920FD38F0342E398BAF5D0
-
install_name
cmdprmpt.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
systemdex
Targets
-
-
Target
Beta.exe
-
Size
3.1MB
-
MD5
bb26a2979d9a61725f910422403ed4dd
-
SHA1
b46d4a3a7f7253e1d7268c060702d301ebb36dd6
-
SHA256
fb80d28a129184b6a273bd893aeee80765b6ec3eb617d90c6d32d0738bcbbfef
-
SHA512
dfa1d068282cae728f6adf890065c0dcecbf9215646f50313d995afd209f52c07f3fd8e1e414c8712af1e2b5306ef453a9b6419f1c574dbd445acbc276426200
-
SSDEEP
49152:ivEt62XlaSFNWPjljiFa2RoUYI9ihqKhHvJQMoGd9THHB72eh2NT:ivY62XlaSFNWPjljiFXRoUYImh5
-
Quasar payload
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-