General
-
Target
25072024_1537_jdconstructnOrder%E2%80%AEfdp.zip.gz
-
Size
78KB
-
Sample
240725-s2jbdaxgnm
-
MD5
b48c919ebc7b71fa1b86c6fcde102477
-
SHA1
41ff5290a466eb9a645921a2c5025fd14cc4e951
-
SHA256
341a207b9ea09cce9a212455cec88e52ee0fe61d64cfb68f4fd9d979b7ee267c
-
SHA512
17510f0dad338c04e9c2d7ce08506423d6977d694d28b750166149ccf9e8baa02d94cd76fdddf21ef20968eeb9935c2b7d06d6b191ec9c0351303797d50c3bc7
-
SSDEEP
1536:DqX0QfIue19WOLp4bkrlsoLj6VefwKaLrzI73+ZSVKLmXLQ37+c4dA:DmFe19WOV4gBso3oefuI73+WKLmXLQrB
Static task
static1
Behavioral task
behavioral1
Sample
jdconstructnOrderfdp..exe
Resource
win7-20240705-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.228.105.2:4782
4ea5c3e6-40ed-401e-8a68-e96daa2a46a9
-
encryption_key
0FE4B3C613E3E61C318BA9D568DC6A8C56D2E505
-
install_name
jorder.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Targets
-
-
Target
jdconstructnOrderfdp..exe
-
Size
288KB
-
MD5
7e900eb50f9dc1cb5c68ffea4b9e7bcc
-
SHA1
4dcc14dc2b98fbc171308fb55b5b8551dd96ea96
-
SHA256
8636f8c4fe1fe4859a3feec23a0cecf12391ddbffbb3d2bec5efe8f3aaac74b3
-
SHA512
a77aeffc4f80358940e40789a67f67df5adc1bde4790a400665a98871498b10c3206981d3f18efa1149c9ec246f0343d133dd77de4f5a1f5816506a204276b1a
-
SSDEEP
3072:6q6+ouCpk2mpcWJ0r+QNTBfRuk1qXkXRA4XTZK:6ldk1cWQRNTBpd8t
-
Quasar payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-