General
-
Target
c5771e769360e622765173e2845bae54b79092ad52c0cbf4c52b668b4e740272
-
Size
1.4MB
-
Sample
241101-v3zqvs1qdz
-
MD5
f26ef938c2c4235c5e4cdb4ebb801fca
-
SHA1
7c3413c638ea0c93cf2951cf05249df89bd98ff8
-
SHA256
c5771e769360e622765173e2845bae54b79092ad52c0cbf4c52b668b4e740272
-
SHA512
84d9d421b6794d412f55d8db296d55b46d25c0980da4a75eacf39d9ad912403bfd0a09142c907328df47b0a676826bd8a0ac422d6e89541da5ca49c13f073096
-
SSDEEP
24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk
Static task
static1
Behavioral task
behavioral1
Sample
c5771e769360e622765173e2845bae54b79092ad52c0cbf4c52b668b4e740272.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c5771e769360e622765173e2845bae54b79092ad52c0cbf4c52b668b4e740272.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.3.0.0
-
94.131.105.161:12344
QSR_MUTEX_UEgITWnMKnRP3EZFzK
-
encryption_key
5Q0JQBQQfAUHRJTcAIOF
-
install_name
lient.exe
-
log_directory
Lugs
-
reconnect_delay
3000
-
startup_key
itartup
-
subdirectory
SubDir
Targets
-
-
Target
c5771e769360e622765173e2845bae54b79092ad52c0cbf4c52b668b4e740272
-
Size
1.4MB
-
MD5
f26ef938c2c4235c5e4cdb4ebb801fca
-
SHA1
7c3413c638ea0c93cf2951cf05249df89bd98ff8
-
SHA256
c5771e769360e622765173e2845bae54b79092ad52c0cbf4c52b668b4e740272
-
SHA512
84d9d421b6794d412f55d8db296d55b46d25c0980da4a75eacf39d9ad912403bfd0a09142c907328df47b0a676826bd8a0ac422d6e89541da5ca49c13f073096
-
SSDEEP
24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk
-
Modifies WinLogon for persistence
-
Quasar family
-
Quasar payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Modifies Windows Firewall
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2