General
-
Target
83e48dca5574b8875b8efd202de1841263c97e38ccf8866649e0cf9b3d894378N
-
Size
349KB
-
Sample
241110-1djw1avhmm
-
MD5
715f939575713752a183aa75ff78e2b0
-
SHA1
11ce91d273eb5af1a87ed43af27cb12a971ecdcd
-
SHA256
83e48dca5574b8875b8efd202de1841263c97e38ccf8866649e0cf9b3d894378
-
SHA512
b844ffd4d0a220033886ce2096c8c61c44e86441cf811336d1be08c5160315da4cb7a46bebf5188e51e12b386e4f4f184905a18b08e96499eabdb8814f006011
-
SSDEEP
6144:JK2J10qdSlEc39HGICa7TE3nKoICeeS2bwqHO4baeLV9w0Z:JKFL03nKoICeeSuOSLg0Z
Behavioral task
behavioral1
Sample
83e48dca5574b8875b8efd202de1841263c97e38ccf8866649e0cf9b3d894378N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
83e48dca5574b8875b8efd202de1841263c97e38ccf8866649e0cf9b3d894378N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.3.0.0
Cotizaciones23
192.168.1.198:4782
QSR_MUTEX_GWVYbrP9HvYlifSt0V
-
encryption_key
qJrrGgGodx4vKyBDIosm
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
client
-
subdirectory
cles
Targets
-
-
Target
83e48dca5574b8875b8efd202de1841263c97e38ccf8866649e0cf9b3d894378N
-
Size
349KB
-
MD5
715f939575713752a183aa75ff78e2b0
-
SHA1
11ce91d273eb5af1a87ed43af27cb12a971ecdcd
-
SHA256
83e48dca5574b8875b8efd202de1841263c97e38ccf8866649e0cf9b3d894378
-
SHA512
b844ffd4d0a220033886ce2096c8c61c44e86441cf811336d1be08c5160315da4cb7a46bebf5188e51e12b386e4f4f184905a18b08e96499eabdb8814f006011
-
SSDEEP
6144:JK2J10qdSlEc39HGICa7TE3nKoICeeS2bwqHO4baeLV9w0Z:JKFL03nKoICeeSuOSLg0Z
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1