General
-
Target
512.exe
-
Size
3.1MB
-
Sample
240629-zya9xszclm
-
MD5
317a46786b73fccfafa5b5678c1a21a1
-
SHA1
e72c0001fb47a477514f5abdb348ae489de65f72
-
SHA256
1dba5015247e9e52949d62c60c23713657123b7786cb790d6f1534126936c1b2
-
SHA512
237b4b626c30911e1f705ac9765d33446f6948630e2a4179d444391cd4e8338e34691da69a8f044b329889c3680aa9cc19108482abe51f179c354d81c8ce678f
-
SSDEEP
49152:Sv6I22SsaNYfdPBldt698dBcjH3mRJ6SbR3LoGdmTHHB72eh2NT:Sv322SsaNYfdPBldt6+dBcjH3mRJ6M
Behavioral task
behavioral1
Sample
512.exe
Resource
win7-20240611-en
Malware Config
Extracted
quasar
1.4.1
Office04
pringelsy-51954.portmap.host:51954
ed30a1b2-d1a0-4e30-a860-b77fa3f71c40
-
encryption_key
49F9D3CAD835E70C60B54E401E356C16B3822AE8
-
install_name
Opera GX.exe
-
log_directory
Logs
-
reconnect_delay
1000
-
startup_key
OperaVPN
-
subdirectory
common Files
Targets
-
-
Target
512.exe
-
Size
3.1MB
-
MD5
317a46786b73fccfafa5b5678c1a21a1
-
SHA1
e72c0001fb47a477514f5abdb348ae489de65f72
-
SHA256
1dba5015247e9e52949d62c60c23713657123b7786cb790d6f1534126936c1b2
-
SHA512
237b4b626c30911e1f705ac9765d33446f6948630e2a4179d444391cd4e8338e34691da69a8f044b329889c3680aa9cc19108482abe51f179c354d81c8ce678f
-
SSDEEP
49152:Sv6I22SsaNYfdPBldt698dBcjH3mRJ6SbR3LoGdmTHHB72eh2NT:Sv322SsaNYfdPBldt6+dBcjH3mRJ6M
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-