Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
a760c4263a2d1e144c2fd116bf1351e1.bin
-
Size
229KB
-
Sample
240612-c639cayhnn
-
MD5
d18983ed988e11f6bc61465248ac8c2a
-
SHA1
69c08a36db31b18fa3543a681ff009fec32331fc
-
SHA256
cb2efd76831c2dbf85368de55e298c290fa3d22f303745195c734ee4cf979c79
-
SHA512
1ac6cfd32688efc12f091d076f9dee568b84a53f8e8ce1c369e7c0c3d79a7ece8a57fc4ca6c2085fd60ad24a53fde116931b4022c60235e03b59ceaf7f0bce41
-
SSDEEP
6144:ZV9qTTh6IYxNTW0m2JDUQ2sysd/OFvbNNa+9A6:BvNTF9ysd/OFjTa+m6
Behavioral task
behavioral1
Sample
37fa30c9dcf255bda62c0a6b7f88a48263a3da18d18d8c66b1cbbc801077cfdf.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
1.4.0
BEOBEO
222.253.182.185:9090
b629c3f9-6e84-4b12-aa44-142bd48d26fe
-
encryption_key
E3F9325FDCF7CBE474DB678812431E432D3171B2
-
install_name
Realtek HD Audio Universal Services.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Realtek
-
subdirectory
Realtek HD Audio Universal Services
Targets
-
-
Target
37fa30c9dcf255bda62c0a6b7f88a48263a3da18d18d8c66b1cbbc801077cfdf.exe
-
Size
503KB
-
MD5
a760c4263a2d1e144c2fd116bf1351e1
-
SHA1
98da7637a98df832078ed0ec08d11d588223783e
-
SHA256
37fa30c9dcf255bda62c0a6b7f88a48263a3da18d18d8c66b1cbbc801077cfdf
-
SHA512
ee8ff2686a4a95a779711ca3126423f769351de6b9e8a27d0ff0d78212e76ef703ada91778620799dd3dbe07cea840f7f44c65273278ea3b4f539274dbc806bf
-
SSDEEP
12288:+TEgdfY97axTU7H4TywQCngRnLN9cHcdA:bUwkyoywQCnkgcdA
-
Quasar payload
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-