General
-
Target
e929375c114907b4f904df77e22bc68551606011b01a186640f34d38259d2575N
-
Size
3.1MB
-
Sample
241004-npklfswckf
-
MD5
ad2e1e26843028659449081dc60ce0d0
-
SHA1
094af16b4addd1d7984a953ff777d25ee97c1130
-
SHA256
e929375c114907b4f904df77e22bc68551606011b01a186640f34d38259d2575
-
SHA512
9cf82a19ba5679433b6f07cb830fec40b335a6106e626270525667f58d9ffea02badf27b64b0149b18cd855315a163d278100fed89817fd2c9c7161982a0fe40
-
SSDEEP
49152:GvFt62XlaSFNWPjljiFa2RoUYIX5RJ6AbR3LoGdOvTHHB72eh2NT:Gv362XlaSFNWPjljiFXRoUYIX5RJ6a
Behavioral task
behavioral1
Sample
e929375c114907b4f904df77e22bc68551606011b01a186640f34d38259d2575N.exe
Resource
win7-20240708-en
Malware Config
Extracted
quasar
1.4.1
Office04
X2ss-51946.portmap.host:51946
326adeb5-804d-4883-8f14-7baf5a19646e
-
encryption_key
2255F445503583B2E31BF6BC3F2F8F45A6414A9A
-
install_name
Win32.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost.exe
-
subdirectory
SubDir
Targets
-
-
Target
e929375c114907b4f904df77e22bc68551606011b01a186640f34d38259d2575N
-
Size
3.1MB
-
MD5
ad2e1e26843028659449081dc60ce0d0
-
SHA1
094af16b4addd1d7984a953ff777d25ee97c1130
-
SHA256
e929375c114907b4f904df77e22bc68551606011b01a186640f34d38259d2575
-
SHA512
9cf82a19ba5679433b6f07cb830fec40b335a6106e626270525667f58d9ffea02badf27b64b0149b18cd855315a163d278100fed89817fd2c9c7161982a0fe40
-
SSDEEP
49152:GvFt62XlaSFNWPjljiFa2RoUYIX5RJ6AbR3LoGdOvTHHB72eh2NT:Gv362XlaSFNWPjljiFXRoUYIX5RJ6a
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-