General
-
Target
BotOtp.zip
-
Size
23.1MB
-
Sample
241106-qgre5s1bkh
-
MD5
98b7ea90d83c25a0fa10d1311648f030
-
SHA1
a3c6104f2a2434dc16119c4f202dd6066ffd5466
-
SHA256
2b29bc880c22f32fcf4da7c9240d57cce97701ef8ced8a80942be60e5a62b934
-
SHA512
5a09369c731173dd4575e2cd2636c916356c235c815944ff3516b98bb82f1b70eaba19bbd5a87ffd24a2325cad579de47924bc9940705120c6710a82aa57f3fb
-
SSDEEP
393216:OupPyPL4BT5mV/RafK7VkjKMGzMEkiEHgzLSSmSt1Xth1NLRRibpK0BLyH8rM7n:VpPaL4BTORawoKkEkTgXVVXNL0U0BOHl
Static task
static1
Behavioral task
behavioral1
Sample
Database.py
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Database.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Info.py
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
Info.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Main_botrun.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Main_botrun.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Main.ps1
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Main.ps1
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.4.0.0
Office
45.200.149.95:6669
6HcAGCOypVIi6hl6rR
-
encryption_key
3Fmq36RtzQkpmjAWxAFM
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
DISC
-
subdirectory
SubDir
Targets
-
-
Target
Database.py
-
Size
13KB
-
MD5
4b446b8df83e29ae3875fc6628a34d26
-
SHA1
124e5a5b4c743e7df8146e8de83c8854a8a91f94
-
SHA256
af3250b1fb3599d5f6e473b0c2a688efdf53fe075bc023ad09f92a1b9eda93cf
-
SHA512
cf29308e6765ee44f945c82c56d616e67d5e54eef2f6ef8d15382d47668f1a9850593dab114a1d8fba8c27ec9913fcc43356adb2fd7d7fe6a107b64b7f066137
-
SSDEEP
192:DtCzwhZUK1lG+t5e0o2P7oAqoRZmGssG4SscvNR4ugbOhcedhyyQ:FZR7B59LTdlRZmGssGfle8Qj
Score3/10 -
-
-
Target
Info.py
-
Size
245B
-
MD5
b57472e59e28a8bc6123efaecf4ea46c
-
SHA1
e83af35771a3f8469230c6fe9e22c7d6e605f9a8
-
SHA256
89df538129297f3a104168e33bea595703d6d5c64bed44642a165de6ecf2923c
-
SHA512
3a7bbff856c40afe53f01d03bb1fcf3f5e6230c955189c6a7d29982756197b54f4b13f298989e5e619622fafea00fba7ae221f7dc68dfebfe1fe5ff68742a0e9
Score3/10 -
-
-
Target
Main_botrun.exe
-
Size
23.8MB
-
MD5
e6ea60f7cba638e262aebbbbc337f364
-
SHA1
ddc525204f9511e3a2d322bb03445c135c92a1ca
-
SHA256
030a63147a608c906dabf42c00dfdfc0b245a6ecd81dcfc43d6fc0c95421f444
-
SHA512
bdc1a0bbba753cebabc16a1f7171ff5cd91f14e95fdfe96f9e17b0b95eb38bebbe7dd43f94465249ab52f3c1da9a918ad5585adc50db319f8bb1cceb77db4bfb
-
SSDEEP
393216:vKHtKeBbDybTlS/oFBjMpWRHU1xIYgLAXsLASfdWXhZaNDIlT1OLABpvE9RW6PCZ:vKHtvBbklSsJMg8xthXslRWs+9E90U
-
Quasar family
-
Quasar payload
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
Suspicious use of SetThreadContext
-
-
-
Target
Main.pyc
-
Size
90KB
-
MD5
c7efb9da956be8d2dbd5314342b1de21
-
SHA1
0b4fbc09fee104c3dc9574dd96fcf2823371be1c
-
SHA256
37a3bbf4e262fac0e51070adfcabb378ff781d2186d4cb2dafc9b0c0cf447240
-
SHA512
32799765f299464a90af7d6a844d8b5b411b1ab68099606334bb575d9abe60425e4da67d00bbef93191774377012d341ceaf943f06e9f75b77088f72f81e03f9
-
SSDEEP
1536:TtRrzJhz6InGZZjigX1LH4PEh8tWoZIGvFO8Wl:THvjzOZ9PoZIGvPWl
Score3/10 -