General
-
Target
Adobe.rar
-
Size
612.5MB
-
Sample
241110-njbflawdnb
-
MD5
6a72602258012e400b40ad018f6885f3
-
SHA1
01200a06e3078e434899b733f1e3968755e3bee3
-
SHA256
dd07e0d43e01089a7962b4f6329923e524d0ec92a79255697d92b865d519c410
-
SHA512
1bec325a8d906f5ee34761127769d9711b772ae31069746014e4da7283373a4c1d439732938a586a8bd47dd76f3ceb062ef517966730353a0ea9f3c78cb8fd19
-
SSDEEP
12582912:m64MUljG/WAM5a0lAuMCPVR8gUHqpXksmTZJhtDpoILRYHh9zZ6O:hchcAI0+up8gUKpFmTznNfRcHZB
Static task
static1
Behavioral task
behavioral1
Sample
Adobe.rar
Resource
win11-20241023-en
Malware Config
Extracted
quasar
1.3.0.0
GRAPHISOFT ArchiCAD 26 Build!!
iniwork.4cloud.click:1980
47XhrAfV3mT6HsUu8d
-
encryption_key
CU7wKvrAqbLlamz4XKEi
-
install_name
helpar.exe
-
log_directory
HDR
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
HERLPAR
Targets
-
-
Target
Adobe.rar
-
Size
612.5MB
-
MD5
6a72602258012e400b40ad018f6885f3
-
SHA1
01200a06e3078e434899b733f1e3968755e3bee3
-
SHA256
dd07e0d43e01089a7962b4f6329923e524d0ec92a79255697d92b865d519c410
-
SHA512
1bec325a8d906f5ee34761127769d9711b772ae31069746014e4da7283373a4c1d439732938a586a8bd47dd76f3ceb062ef517966730353a0ea9f3c78cb8fd19
-
SSDEEP
12582912:m64MUljG/WAM5a0lAuMCPVR8gUHqpXksmTZJhtDpoILRYHh9zZ6O:hchcAI0+up8gUKpFmTznNfRcHZB
-
Quasar family
-
Quasar payload
-
Modifies Windows Firewall
-
A potential corporate email address has been identified in the URL: [email protected]
-
Checks QEMU agent file
Checks presence of QEMU agent, possibly to detect virtualization.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Pre-OS Boot
1Bootkit
1