General
-
Target
ffa58ebc168e4a19c311097b97645a5d8801db2326f4e8784b634c3e2e2de991
-
Size
1.4MB
-
Sample
241119-hj7adawpgl
-
MD5
c28ef8671a7f140f9385ab177e38844b
-
SHA1
4cc35c23f2ce252413249ecd2ea47967fc00d5a4
-
SHA256
ffa58ebc168e4a19c311097b97645a5d8801db2326f4e8784b634c3e2e2de991
-
SHA512
6ce012bf3c1024eef4a47f54c86e3819175816d6c39bfa2216d1d522fc9612637473d8c6be2f4f203f52fc38c2bf887ed6e748ff5c18ee960fb0d82014ade82a
-
SSDEEP
12288:2fcOokxZ4FK9VlPprK7w5NljuDvdLwLEcXq8dxSaDygxpy3nZOJcllvB:2P8FMhQiXhxkKcOUv
Static task
static1
Behavioral task
behavioral1
Sample
ffa58ebc168e4a19c311097b97645a5d8801db2326f4e8784b634c3e2e2de991.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Chim
aboushagor.ydns.eu:6542
0b30f45d-3c54-4926-a32f-8a1dc077eb21
-
encryption_key
799E5C34BA6EC18D72E269D0C5CF1A5AC1AD9277
-
install_name
windows update.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Targets
-
-
Target
ffa58ebc168e4a19c311097b97645a5d8801db2326f4e8784b634c3e2e2de991
-
Size
1.4MB
-
MD5
c28ef8671a7f140f9385ab177e38844b
-
SHA1
4cc35c23f2ce252413249ecd2ea47967fc00d5a4
-
SHA256
ffa58ebc168e4a19c311097b97645a5d8801db2326f4e8784b634c3e2e2de991
-
SHA512
6ce012bf3c1024eef4a47f54c86e3819175816d6c39bfa2216d1d522fc9612637473d8c6be2f4f203f52fc38c2bf887ed6e748ff5c18ee960fb0d82014ade82a
-
SSDEEP
12288:2fcOokxZ4FK9VlPprK7w5NljuDvdLwLEcXq8dxSaDygxpy3nZOJcllvB:2P8FMhQiXhxkKcOUv
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Suspicious use of SetThreadContext
-