General
-
Target
2024-11-15_be97d2a18bd4e9eb41f80f3e3a71656a_luca-stealer_magniber
-
Size
5.2MB
-
Sample
241115-sxtljswgqr
-
MD5
be97d2a18bd4e9eb41f80f3e3a71656a
-
SHA1
f181fb8964b4f7be4a69fc196ec9b95c5b575ea2
-
SHA256
fa59119030b7d7291f97ea16728f592d3e2ea1aab62172e0b57a60db818ea082
-
SHA512
170d383ef0418ce3a533487d99ffa8ca47ad843040747bd98a48f73867c57570f7c37429a8c0c92172f14fa902666bfa195d42a2a2cdf838ab01816313135632
-
SSDEEP
98304:SCYMqfuEk+8WwFsBSSUCa9qyr1ijMauCDhg0eUAnMyApx0GXtRnWV:xYMqfuEk+8W0bzJVauCDT0MyApxPjWV
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-15_be97d2a18bd4e9eb41f80f3e3a71656a_luca-stealer_magniber.exe
Resource
win7-20241023-en
Malware Config
Extracted
quasar
1.4.1
1
127.0.0.1:4782
5313dac9-d7fe-402d-ba5b-5c27a31badf6
-
encryption_key
597DA3394F4E2AF05CA763935FC87776B4F9F811
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
2024-11-15_be97d2a18bd4e9eb41f80f3e3a71656a_luca-stealer_magniber
-
Size
5.2MB
-
MD5
be97d2a18bd4e9eb41f80f3e3a71656a
-
SHA1
f181fb8964b4f7be4a69fc196ec9b95c5b575ea2
-
SHA256
fa59119030b7d7291f97ea16728f592d3e2ea1aab62172e0b57a60db818ea082
-
SHA512
170d383ef0418ce3a533487d99ffa8ca47ad843040747bd98a48f73867c57570f7c37429a8c0c92172f14fa902666bfa195d42a2a2cdf838ab01816313135632
-
SSDEEP
98304:SCYMqfuEk+8WwFsBSSUCa9qyr1ijMauCDhg0eUAnMyApx0GXtRnWV:xYMqfuEk+8W0bzJVauCDT0MyApxPjWV
-
Quasar family
-
Quasar payload
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of SetThreadContext
-