General
-
Target
file.ps1
-
Size
5KB
-
Sample
240613-fl7b2syejr
-
MD5
4423e1ca4a31c0d57ca4c3f6c8c90b71
-
SHA1
2391ec187dff5771c8580c8e2ff3a3ef8aebdf62
-
SHA256
5fb6f4eb5a18cae3792438f5e919efb46a46fffbdf18986f52b425c8b5983b55
-
SHA512
c4f86652d4525b5412f4063f412b9486ffe411a1bdf33efae82f2544f8da92260c4666a2b85ca8ed55bbf71270d1f9ddd66008aa3db317c47958dd56c3bce759
-
SSDEEP
96:Wy9RoMdK9QDoiIcnG+BUy0Y5nO+GKTZ3enFOoS+4grynmXVRhXaBk:7kWi9Ef5nOpKtkO5sQmABk
Static task
static1
Behavioral task
behavioral1
Sample
file.ps1
Resource
win11-20240611-en
Malware Config
Extracted
quasar
1.3.0.0
Boris FX Sapphire
craftmoold.ddnsguru.com:1983
VspDxC4KY6UH5ES3Xw
-
encryption_key
X8GClSeDI9aurtbGirOt
-
install_name
Client.exe
-
log_directory
16HD
-
reconnect_delay
6000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
file.ps1
-
Size
5KB
-
MD5
4423e1ca4a31c0d57ca4c3f6c8c90b71
-
SHA1
2391ec187dff5771c8580c8e2ff3a3ef8aebdf62
-
SHA256
5fb6f4eb5a18cae3792438f5e919efb46a46fffbdf18986f52b425c8b5983b55
-
SHA512
c4f86652d4525b5412f4063f412b9486ffe411a1bdf33efae82f2544f8da92260c4666a2b85ca8ed55bbf71270d1f9ddd66008aa3db317c47958dd56c3bce759
-
SSDEEP
96:Wy9RoMdK9QDoiIcnG+BUy0Y5nO+GKTZ3enFOoS+4grynmXVRhXaBk:7kWi9Ef5nOpKtkO5sQmABk
-
Quasar payload
-
Blocklisted process makes network request
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-