General
-
Target
2abc4eca6e91c8766cf9fce20d24ce847fcf17dc3dd67c94d332b12061154258.unknown
-
Size
72KB
-
Sample
240730-bp2hravejg
-
MD5
535cf27993ef8db14c45b5f387c74728
-
SHA1
88493415cad54c3d49634248224977de88e719d3
-
SHA256
2abc4eca6e91c8766cf9fce20d24ce847fcf17dc3dd67c94d332b12061154258
-
SHA512
3dfb9f9148850247ec7f37d1553e891ac5b69c2cec8ebe47ee772665f573863f689099619f8de950e2ad0a7520765d260a3a37f428a60922d63462ac7aaea780
-
SSDEEP
1536:Gu5ubqzxwDly+vz4yhNJ+ujU60QNq/V0BTko0+oamlv3Wjsqnk:H5NwB9z9JbpmAgojIlv5qk
Static task
static1
Behavioral task
behavioral1
Sample
jdconstructnOrderfdp..exe
Resource
win7-20240704-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.228.105.2:4782
4ea5c3e6-40ed-401e-8a68-e96daa2a46a9
-
encryption_key
0FE4B3C613E3E61C318BA9D568DC6A8C56D2E505
-
install_name
jorder.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Targets
-
-
Target
jdconstructnOrderfdp..exe
-
Size
288KB
-
MD5
7e900eb50f9dc1cb5c68ffea4b9e7bcc
-
SHA1
4dcc14dc2b98fbc171308fb55b5b8551dd96ea96
-
SHA256
8636f8c4fe1fe4859a3feec23a0cecf12391ddbffbb3d2bec5efe8f3aaac74b3
-
SHA512
a77aeffc4f80358940e40789a67f67df5adc1bde4790a400665a98871498b10c3206981d3f18efa1149c9ec246f0343d133dd77de4f5a1f5816506a204276b1a
-
SSDEEP
3072:6q6+ouCpk2mpcWJ0r+QNTBfRuk1qXkXRA4XTZK:6ldk1cWQRNTBpd8t
-
Quasar payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-