General
-
Target
kreo q zi.exe
-
Size
3.1MB
-
Sample
241104-ydj6naylep
-
MD5
28ac02fc40c8f1c2a8989ee3c09a1372
-
SHA1
b182758b62a1482142c0fce4be78c786e08b7025
-
SHA256
0fe81f9a51cf0068408de3c3605ce2033a00bd7ec90cc9516c38f6069e06433b
-
SHA512
2cbf2f6af46e5fae8e67144e1ac70bc748036c7adb7f7810d7d7d9f255ccf5d163cce07f11fb6526f9ab61c39f28bdf2356cc315b19a61cd2115612882eab767
-
SSDEEP
49152:7v+lL26AaNeWgPhlmVqvMQ7XSKsxRJ6wbR3LoGdGTHHB72eh2NT:7vuL26AaNeWgPhlmVqkQ7XSKsxRJ6K
Malware Config
Extracted
quasar
1.4.1
Office04
hola435-24858.portmap.host:24858
e51e2b65-e963-4051-9736-67d57ed46798
-
encryption_key
AEA258EF65BF1786F0F767C0BE2497ECC304C46F
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
kreo q zi.exe
-
Size
3.1MB
-
MD5
28ac02fc40c8f1c2a8989ee3c09a1372
-
SHA1
b182758b62a1482142c0fce4be78c786e08b7025
-
SHA256
0fe81f9a51cf0068408de3c3605ce2033a00bd7ec90cc9516c38f6069e06433b
-
SHA512
2cbf2f6af46e5fae8e67144e1ac70bc748036c7adb7f7810d7d7d9f255ccf5d163cce07f11fb6526f9ab61c39f28bdf2356cc315b19a61cd2115612882eab767
-
SSDEEP
49152:7v+lL26AaNeWgPhlmVqvMQ7XSKsxRJ6wbR3LoGdGTHHB72eh2NT:7vuL26AaNeWgPhlmVqkQ7XSKsxRJ6K
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Deletes itself
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1