General
-
Target
https://drive.google.com/file/d/19dtPJV6XBEH8ZjCCr3OlGMEzgJOkNogL/view?pli=1
-
Sample
241006-ptefnsydlh
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/19dtPJV6XBEH8ZjCCr3OlGMEzgJOkNogL/view?pli=1
Resource
win10v2004-20240802-en
windows10-2004-x64
27 signatures
150 seconds
Malware Config
Extracted
Family
quasar
Version
1.4.0
Botnet
EaseUSTodo
C2
officeworld.freeddns.org:8898
mianoffice221.kozow.com:8898
Mutex
a9a13ab7-c562-46fd-bbd2-326a345c4bf8
Attributes
-
encryption_key
2EA31F57ED19DE155F86E8C6311EB312416F74DC
-
install_name
Client.exe
-
log_directory
CrashLogs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
https://drive.google.com/file/d/19dtPJV6XBEH8ZjCCr3OlGMEzgJOkNogL/view?pli=1
-
Detect ZGRat V2
-
Modifies WinLogon for persistence
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-