General
-
Target
035f44415228a4f73d1aab1a7f3ff75b8138f2b093586b49cf4faef32587863b.rar
-
Size
394KB
-
Sample
241119-chqcksynew
-
MD5
8cbbbbc1432a5368e903073e28c54603
-
SHA1
477f6b0794bbae0c97c7fde59af91e09e09c63ad
-
SHA256
035f44415228a4f73d1aab1a7f3ff75b8138f2b093586b49cf4faef32587863b
-
SHA512
ed0d7da138537ccf850f35295bf44b05ea8cb84aba71504b74c20727cfc9373eb8f9c33bd676b39b6647e6ce5941ca2aa37002b8d338e3ad1a895683086bb7a0
-
SSDEEP
12288:ZctiiLWbhVZ8oYYyCFNCkSMlE7k0ZFCdrfhNVF:AqbhV+o+O3E7Hj+v
Static task
static1
Behavioral task
behavioral1
Sample
New Purchase Order-0304243220- SMART SOURCING INC.pdf____________________________________________________.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
Chim
aboushagor.ydns.eu:6542
0b30f45d-3c54-4926-a32f-8a1dc077eb21
-
encryption_key
799E5C34BA6EC18D72E269D0C5CF1A5AC1AD9277
-
install_name
windows update.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Targets
-
-
Target
New Purchase Order-0304243220- SMART SOURCING INC.pdf____________________________________________________.exe
-
Size
1.4MB
-
MD5
c28ef8671a7f140f9385ab177e38844b
-
SHA1
4cc35c23f2ce252413249ecd2ea47967fc00d5a4
-
SHA256
ffa58ebc168e4a19c311097b97645a5d8801db2326f4e8784b634c3e2e2de991
-
SHA512
6ce012bf3c1024eef4a47f54c86e3819175816d6c39bfa2216d1d522fc9612637473d8c6be2f4f203f52fc38c2bf887ed6e748ff5c18ee960fb0d82014ade82a
-
SSDEEP
12288:2fcOokxZ4FK9VlPprK7w5NljuDvdLwLEcXq8dxSaDygxpy3nZOJcllvB:2P8FMhQiXhxkKcOUv
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Suspicious use of SetThreadContext
-