General
-
Target
37fa30c9dcf255bda62c0a6b7f88a48263a3da18d18d8c66b1cbbc801077cfdf.exe
-
Size
503KB
-
Sample
240611-vg51ravann
-
MD5
a760c4263a2d1e144c2fd116bf1351e1
-
SHA1
98da7637a98df832078ed0ec08d11d588223783e
-
SHA256
37fa30c9dcf255bda62c0a6b7f88a48263a3da18d18d8c66b1cbbc801077cfdf
-
SHA512
ee8ff2686a4a95a779711ca3126423f769351de6b9e8a27d0ff0d78212e76ef703ada91778620799dd3dbe07cea840f7f44c65273278ea3b4f539274dbc806bf
-
SSDEEP
12288:+TEgdfY97axTU7H4TywQCngRnLN9cHcdA:bUwkyoywQCnkgcdA
Behavioral task
behavioral1
Sample
37fa30c9dcf255bda62c0a6b7f88a48263a3da18d18d8c66b1cbbc801077cfdf.exe
Resource
win7-20240215-en
Malware Config
Extracted
quasar
1.4.0
BEOBEO
222.253.182.185:9090
b629c3f9-6e84-4b12-aa44-142bd48d26fe
-
encryption_key
E3F9325FDCF7CBE474DB678812431E432D3171B2
-
install_name
Realtek HD Audio Universal Services.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Realtek
-
subdirectory
Realtek HD Audio Universal Services
Targets
-
-
Target
37fa30c9dcf255bda62c0a6b7f88a48263a3da18d18d8c66b1cbbc801077cfdf.exe
-
Size
503KB
-
MD5
a760c4263a2d1e144c2fd116bf1351e1
-
SHA1
98da7637a98df832078ed0ec08d11d588223783e
-
SHA256
37fa30c9dcf255bda62c0a6b7f88a48263a3da18d18d8c66b1cbbc801077cfdf
-
SHA512
ee8ff2686a4a95a779711ca3126423f769351de6b9e8a27d0ff0d78212e76ef703ada91778620799dd3dbe07cea840f7f44c65273278ea3b4f539274dbc806bf
-
SSDEEP
12288:+TEgdfY97axTU7H4TywQCngRnLN9cHcdA:bUwkyoywQCnkgcdA
-
Quasar payload
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-