General
-
Target
f1bedec9834e6b7457571b68587406b042b071cb244958afbbf4543b29c49759
-
Size
3.5MB
-
Sample
241113-yy6kdsyeqq
-
MD5
305b0cf01534c4efda55d1c2fae17fb0
-
SHA1
13472d5c223b6279e94652a166799a8fb6dcf74f
-
SHA256
f1bedec9834e6b7457571b68587406b042b071cb244958afbbf4543b29c49759
-
SHA512
983995729e3441daa5beb4ce7827ca781af5b29e74bda7ae267665169c2501d32a5387ea93f1620d22d3ff9cfff21b9913c9f94f7071cd6c8fd03896f49aeb9a
-
SSDEEP
98304:SgryDlzDAelXXs9ouzoWPqd3XkhegK12uYpHKBB:rrKmcWihVj16pqBB
Static task
static1
Behavioral task
behavioral1
Sample
f1bedec9834e6b7457571b68587406b042b071cb244958afbbf4543b29c49759.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
5-11
crostech.ru:4782
9522011d-ded6-4922-8707-defd6cf46145
-
encryption_key
DD459BB92A43EF8EEB2FE401C8453F685AECE590
-
install_name
ChromiumDaemon.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Chromium Extentions Service
-
subdirectory
ChromiumExtentions
Targets
-
-
Target
f1bedec9834e6b7457571b68587406b042b071cb244958afbbf4543b29c49759
-
Size
3.5MB
-
MD5
305b0cf01534c4efda55d1c2fae17fb0
-
SHA1
13472d5c223b6279e94652a166799a8fb6dcf74f
-
SHA256
f1bedec9834e6b7457571b68587406b042b071cb244958afbbf4543b29c49759
-
SHA512
983995729e3441daa5beb4ce7827ca781af5b29e74bda7ae267665169c2501d32a5387ea93f1620d22d3ff9cfff21b9913c9f94f7071cd6c8fd03896f49aeb9a
-
SSDEEP
98304:SgryDlzDAelXXs9ouzoWPqd3XkhegK12uYpHKBB:rrKmcWihVj16pqBB
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1