General
-
Target
payment.details.lnk.lnk
-
Size
2KB
-
Sample
241102-hbhbaaykhv
-
MD5
04e779f16953e15b609dfab5be6ebd26
-
SHA1
d0e0b98da3f2ee3b0f8346d511436891380dd4f6
-
SHA256
e29b86ad063e26d4f88cc123f784983f542357cf922f296813b615c3d0d80a00
-
SHA512
4e1967297fb67949b14b16fe8f1d8292360b94602e9da4871476bd7bba84c2cc013bc1b1cedff029c8b01b81f357657919cddcc030ad783a4e61a8db2e5b564b
Static task
static1
Behavioral task
behavioral1
Sample
payment.details.lnk
Resource
win7-20240903-en
Malware Config
Extracted
http://45.149.241.169:5336/ghsjfsgfjsyhsfhzgbdfbgzgfb/yugygfyjsbdfoesrjfzbhffbserhbwdewbrtsnbdjkfbrhjgvghvhgvhgvhgvHfgcNchgfcnhchgchgcnGfcngcgdcngchcngch/jhbhfbjadhghjvgfcxhhfcjtgvkhdfskjdkbzhdfhmzdkydbfvhzdfjgvhzvg/tfvjtcfgchgcgcHcgcftjcgtygvgFtrdcjfcgkhvGcjfcxhfcjgVK/chfgcx.exe
Extracted
quasar
1.3.0.0
VTROY
31.13.224.12:61512
31.13.224.13:61513
QSR_MUTEX_4Q2rJqiVyC7hohzbjx
-
encryption_key
7Vp2dMCHrMjJthQ2Elyy
-
install_name
downloads.exe
-
log_directory
Logs
-
reconnect_delay
5000
-
startup_key
cssrse.exe
-
subdirectory
downloadupdates
Targets
-
-
Target
payment.details.lnk.lnk
-
Size
2KB
-
MD5
04e779f16953e15b609dfab5be6ebd26
-
SHA1
d0e0b98da3f2ee3b0f8346d511436891380dd4f6
-
SHA256
e29b86ad063e26d4f88cc123f784983f542357cf922f296813b615c3d0d80a00
-
SHA512
4e1967297fb67949b14b16fe8f1d8292360b94602e9da4871476bd7bba84c2cc013bc1b1cedff029c8b01b81f357657919cddcc030ad783a4e61a8db2e5b564b
-
Quasar family
-
Quasar payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-