General
-
Target
a867e87d6f26d0f3eec8bfafb7baf6b5e3db22c962426ecb8e96b5826bfd9e72
-
Size
3.5MB
-
Sample
241113-vlj9vawdpq
-
MD5
2cd4f099577ed75e92cdee860436db0c
-
SHA1
a6ab341f7f8a8ab591673dfd024ec1de08f737ce
-
SHA256
a867e87d6f26d0f3eec8bfafb7baf6b5e3db22c962426ecb8e96b5826bfd9e72
-
SHA512
151ce1357a56c47836cf6680dc48d2a4abe44e2ece4ff6babb2cd7a6d33b15a11fcef059783ba2e3f1751925679338a818e3480be668fd509b0f7d96e8812bd6
-
SSDEEP
98304:DQHsEgv9H3MaF4MlLXkffcuSBIZugz+utBaElCDuaL:DEgBVF3Fof0Bwj+uJ4qC
Static task
static1
Behavioral task
behavioral1
Sample
a867e87d6f26d0f3eec8bfafb7baf6b5e3db22c962426ecb8e96b5826bfd9e72.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
11-11
crostech.ru:4782
b0b81641-2033-41aa-bce4-7caf83c8ece2
-
encryption_key
DD459BB92A43EF8EEB2FE401C8453F685AECE590
-
install_name
ChromiumDaemon.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Chromium Extentions Service
-
subdirectory
ChromiumExtentions
Targets
-
-
Target
a867e87d6f26d0f3eec8bfafb7baf6b5e3db22c962426ecb8e96b5826bfd9e72
-
Size
3.5MB
-
MD5
2cd4f099577ed75e92cdee860436db0c
-
SHA1
a6ab341f7f8a8ab591673dfd024ec1de08f737ce
-
SHA256
a867e87d6f26d0f3eec8bfafb7baf6b5e3db22c962426ecb8e96b5826bfd9e72
-
SHA512
151ce1357a56c47836cf6680dc48d2a4abe44e2ece4ff6babb2cd7a6d33b15a11fcef059783ba2e3f1751925679338a818e3480be668fd509b0f7d96e8812bd6
-
SSDEEP
98304:DQHsEgv9H3MaF4MlLXkffcuSBIZugz+utBaElCDuaL:DEgBVF3Fof0Bwj+uJ4qC
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1