Analysis
-
max time kernel
95s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-11-2024 18:38
Behavioral task
behavioral1
Sample
5c76b09c0f287820cc34b5f06a8fd627bface66474241daa4b5d86273cf3102d.exe
Resource
win7-20240903-en
General
-
Target
5c76b09c0f287820cc34b5f06a8fd627bface66474241daa4b5d86273cf3102d.exe
-
Size
347KB
-
MD5
cef03024e5b35b5197c1337596109958
-
SHA1
6ca77f693ccc8c283c4de40fb94b62b06538437d
-
SHA256
5c76b09c0f287820cc34b5f06a8fd627bface66474241daa4b5d86273cf3102d
-
SHA512
b683f194c7fd437596a263327e147c98f94e3898d20fcbf9a36dafbc7817ba77ad562c6fe6400f3c49756257cf1ee6518c6443ae2eef30b9cd0665b6b45286e9
-
SSDEEP
6144:mOL+PQIshf+PME+WoWmbeAR4gt4wG3eCoDs:FisPEfF0ft4wG3eZDs
Malware Config
Extracted
quasar
1.3.0.0
drss
crissnda5.ddns.net:2024
QSR_MUTEX_6VCXMuKq5sglsUPNYu
-
encryption_key
UiCvCUXD3LuQR6fFckYE
-
install_name
Update service.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
service update
-
subdirectory
microsofte
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/4380-1-0x0000000000B00000-0x0000000000B5E000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 7 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4380 5c76b09c0f287820cc34b5f06a8fd627bface66474241daa4b5d86273cf3102d.exe