General
-
Target
background_script.exe
-
Size
10.2MB
-
Sample
240801-chh89s1ala
-
MD5
fe74dabc7081642914f3416aad8753bb
-
SHA1
f662c23a38ec27398826f0bcd9d5503a1a412bbd
-
SHA256
47a549f6c12a86000ebea99389ac5d297dcb42c9734bebcbb3bbd83a177e336e
-
SHA512
8e45cba357b7bbd321ed37e1131f5e6b7ef9ad3234900f241db6f9e0a96853801ac5d5ab79bc08fffb96d2c518e1bd859432413d79dd86b4dc5447726bdab379
-
SSDEEP
196608:NEahQxkEJXU3b01Kpn3V+uq+Vvp9CsXDjpf5ZkHSETM9FGcEX:uahQEL01+l+uq+VvbCEPZkyvUL
Behavioral task
behavioral1
Sample
background_script.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
background_script.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
background_script.pyc
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
background_script.pyc
Resource
win10v2004-20240730-en
Malware Config
Extracted
quasar
1.4.1
Steam
20.ip.gl.ply.gg:55257
15d4edb7-40c0-4a95-9dc8-8fe93071bce0
-
encryption_key
F1B995FFCFBEAA3218870A13F82413DC65D82218
-
install_name
Steam.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SteamClient
-
subdirectory
%appdata%
Targets
-
-
Target
background_script.exe
-
Size
10.2MB
-
MD5
fe74dabc7081642914f3416aad8753bb
-
SHA1
f662c23a38ec27398826f0bcd9d5503a1a412bbd
-
SHA256
47a549f6c12a86000ebea99389ac5d297dcb42c9734bebcbb3bbd83a177e336e
-
SHA512
8e45cba357b7bbd321ed37e1131f5e6b7ef9ad3234900f241db6f9e0a96853801ac5d5ab79bc08fffb96d2c518e1bd859432413d79dd86b4dc5447726bdab379
-
SSDEEP
196608:NEahQxkEJXU3b01Kpn3V+uq+Vvp9CsXDjpf5ZkHSETM9FGcEX:uahQEL01+l+uq+VvbCEPZkyvUL
-
Detect Umbral payload
-
Quasar payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
background_script.pyc
-
Size
3KB
-
MD5
5978f68476275e7b24af869c3d2e988c
-
SHA1
01d13971a416b1c03cfc6dd5e66c5ee69336b90d
-
SHA256
e7dd84c0772b3feb0da7952984ce2e2ba1241d2804841303601699aeb855e1d7
-
SHA512
1796c933aa77aa36d9c4daf42ea2290c2a0e341792c0852870a44e9d8fe38ae09e069ad462fcb96f68023f76f6a9c42915d60706bd8ae181c5332c78e45758ee
Score3/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1