General
-
Target
900e126e8d56ee42be9bf08c083366e7b4d1ce8d4764ab70e8c45f1fa73a75cd
-
Size
3.1MB
-
Sample
240602-rk5mlsee2s
-
MD5
26959ef393fbd309059d5e43041c4fb6
-
SHA1
c3ce55ccf75e8f505bc5ff0b3013a9ae54904b42
-
SHA256
900e126e8d56ee42be9bf08c083366e7b4d1ce8d4764ab70e8c45f1fa73a75cd
-
SHA512
8f87ac4586e538e7adf399eda06c7565e628baab961b23c11f5f4cf24c1439014c7d83f9725d3494910227f78074d0bc2899b9e35040f04a9f53bcc15700f03d
-
SSDEEP
49152:Ov8t62XlaSFNWPjljiFa2RoUYITUZ3larzLoGdOTHHB72eh2NT:OvA62XlaSFNWPjljiFXRoUYIK3G
Behavioral task
behavioral1
Sample
900e126e8d56ee42be9bf08c083366e7b4d1ce8d4764ab70e8c45f1fa73a75cd.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
1.4.1
Office04
5.tcp.eu.ngrok.io:10972
b028487a-6e45-4b66-9e91-3d4903e32b6c
-
encryption_key
91137B461EAD4C8D03DB7ED595191162855E87F2
-
install_name
DRIVER32.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
DRIVER32
-
subdirectory
SYSWOW
Targets
-
-
Target
900e126e8d56ee42be9bf08c083366e7b4d1ce8d4764ab70e8c45f1fa73a75cd
-
Size
3.1MB
-
MD5
26959ef393fbd309059d5e43041c4fb6
-
SHA1
c3ce55ccf75e8f505bc5ff0b3013a9ae54904b42
-
SHA256
900e126e8d56ee42be9bf08c083366e7b4d1ce8d4764ab70e8c45f1fa73a75cd
-
SHA512
8f87ac4586e538e7adf399eda06c7565e628baab961b23c11f5f4cf24c1439014c7d83f9725d3494910227f78074d0bc2899b9e35040f04a9f53bcc15700f03d
-
SSDEEP
49152:Ov8t62XlaSFNWPjljiFa2RoUYITUZ3larzLoGdOTHHB72eh2NT:OvA62XlaSFNWPjljiFXRoUYIK3G
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-