General
-
Target
5c76b09c0f287820cc34b5f06a8fd627bface66474241daa4b5d86273cf3102d.exe
-
Size
347KB
-
Sample
241101-efrtqswhpq
-
MD5
cef03024e5b35b5197c1337596109958
-
SHA1
6ca77f693ccc8c283c4de40fb94b62b06538437d
-
SHA256
5c76b09c0f287820cc34b5f06a8fd627bface66474241daa4b5d86273cf3102d
-
SHA512
b683f194c7fd437596a263327e147c98f94e3898d20fcbf9a36dafbc7817ba77ad562c6fe6400f3c49756257cf1ee6518c6443ae2eef30b9cd0665b6b45286e9
-
SSDEEP
6144:mOL+PQIshf+PME+WoWmbeAR4gt4wG3eCoDs:FisPEfF0ft4wG3eZDs
Behavioral task
behavioral1
Sample
5c76b09c0f287820cc34b5f06a8fd627bface66474241daa4b5d86273cf3102d.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.3.0.0
drss
crissnda5.ddns.net:2024
QSR_MUTEX_6VCXMuKq5sglsUPNYu
-
encryption_key
UiCvCUXD3LuQR6fFckYE
-
install_name
Update service.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
service update
-
subdirectory
microsofte
Targets
-
-
Target
5c76b09c0f287820cc34b5f06a8fd627bface66474241daa4b5d86273cf3102d.exe
-
Size
347KB
-
MD5
cef03024e5b35b5197c1337596109958
-
SHA1
6ca77f693ccc8c283c4de40fb94b62b06538437d
-
SHA256
5c76b09c0f287820cc34b5f06a8fd627bface66474241daa4b5d86273cf3102d
-
SHA512
b683f194c7fd437596a263327e147c98f94e3898d20fcbf9a36dafbc7817ba77ad562c6fe6400f3c49756257cf1ee6518c6443ae2eef30b9cd0665b6b45286e9
-
SSDEEP
6144:mOL+PQIshf+PME+WoWmbeAR4gt4wG3eCoDs:FisPEfF0ft4wG3eZDs
-
Quasar family
-
Quasar payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-