General
-
Target
SC.cmd
-
Size
1.9MB
-
Sample
241003-p2cl2s1fqf
-
MD5
df146ae56b040ce90f1c879a8282a03e
-
SHA1
2e6024ad1883b72057dbaf5eaa2ea84656a443cf
-
SHA256
1e0819a321e43f692e6f2bb08c153ac62b2ae2cbbfb3a1ac7806d55ca3b54df9
-
SHA512
fbec78d95389a2649b86ab8d452af51ab5414e73b5e371838d8e11e85f49573d2452eb97d6790b2bcdb32d9015e30e2396d9570c962c45eeed67351df622ea08
-
SSDEEP
24576:TKLGeNfzqE3gY/noO0Bq8JvRMiUOCYUsQJQTUVXLbsPYmgaF+qbAmMNN0DCDYEpE:b2dGqkqgv+uS6B5R
Static task
static1
Behavioral task
behavioral1
Sample
SC.cmd
Resource
win7-20240729-en
Malware Config
Extracted
quasar
1.4.1
solana
azure-winsecure.com:7000
223694e0-c20b-492e-8b54-5934c96afd76
-
encryption_key
17CE40DD961A56228B8201AD691A6B8B2B149755
-
install_name
Client.exe
-
log_directory
windowskeys
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
SC.cmd
-
Size
1.9MB
-
MD5
df146ae56b040ce90f1c879a8282a03e
-
SHA1
2e6024ad1883b72057dbaf5eaa2ea84656a443cf
-
SHA256
1e0819a321e43f692e6f2bb08c153ac62b2ae2cbbfb3a1ac7806d55ca3b54df9
-
SHA512
fbec78d95389a2649b86ab8d452af51ab5414e73b5e371838d8e11e85f49573d2452eb97d6790b2bcdb32d9015e30e2396d9570c962c45eeed67351df622ea08
-
SSDEEP
24576:TKLGeNfzqE3gY/noO0Bq8JvRMiUOCYUsQJQTUVXLbsPYmgaF+qbAmMNN0DCDYEpE:b2dGqkqgv+uS6B5R
-
Quasar payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Deletes itself
-