General
-
Target
999.exe
-
Size
3.1MB
-
Sample
241025-bfzb2azgjj
-
MD5
983d530245caa91b17923ad5c22d5a05
-
SHA1
7258015623307e65f8ca13d40bb2885efbe60b37
-
SHA256
fb51d3cb76e8bc633c28d25a45b21ac3c906da0c5cfa2deabfaf37169d1847f3
-
SHA512
8f6e4cb59ef7a5c5bfe602e25969811efa894b55446b15dca42ad162628e2cfe48c470f7907bd39350e465b7cf168c60a4d57e023800358d8c917ba07c826b9f
-
SSDEEP
49152:GvBt62XlaSFNWPjljiFa2RoUYIhfRJ6AbR3LoGd3dTHHB72eh2NT:Gvr62XlaSFNWPjljiFXRoUYIhfRJ6a
Behavioral task
behavioral1
Sample
999.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
2.tcp.us-cal-1.ngrok.io:14537
b727f93b-76e6-4279-a76d-61b9727ef2c9
-
encryption_key
B3CE4ADBCFC896D87D5632035EB0E3D075AB14F9
-
install_name
LOGI_INT.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
LOGI_INT
-
subdirectory
SubDir
Targets
-
-
Target
999.exe
-
Size
3.1MB
-
MD5
983d530245caa91b17923ad5c22d5a05
-
SHA1
7258015623307e65f8ca13d40bb2885efbe60b37
-
SHA256
fb51d3cb76e8bc633c28d25a45b21ac3c906da0c5cfa2deabfaf37169d1847f3
-
SHA512
8f6e4cb59ef7a5c5bfe602e25969811efa894b55446b15dca42ad162628e2cfe48c470f7907bd39350e465b7cf168c60a4d57e023800358d8c917ba07c826b9f
-
SSDEEP
49152:GvBt62XlaSFNWPjljiFa2RoUYIhfRJ6AbR3LoGd3dTHHB72eh2NT:Gvr62XlaSFNWPjljiFXRoUYIhfRJ6a
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-