General
-
Target
c28ef8671a7f140f9385ab177e38844b.bin
-
Size
485KB
-
Sample
241120-b3mazssmbq
-
MD5
f591f3eba9c11b9dd82dfc11681ae35c
-
SHA1
912b4593bb7df8a6e873e2384f206efed4efb9ca
-
SHA256
49260429c2d19497a59a7526f51bf6ed76131844a5bfd58ae863d38868d74440
-
SHA512
b423d64e2b9d2ec35b29aa6a737f9eb8befa46f3102cabd4aadc5644b4d2b6bcc7771e3496c97f1943f51f452e9e5b7c20d1f19ee0c603e32229381130d2c8a8
-
SSDEEP
12288:v5vHQdapiVDfsUNpucm/W+KCjYCeqxplocaKcUoo1DbTKOhODkCjfl:v5PnmvUc8k3fcnK2ODfl
Static task
static1
Behavioral task
behavioral1
Sample
ffa58ebc168e4a19c311097b97645a5d8801db2326f4e8784b634c3e2e2de991.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Chim
aboushagor.ydns.eu:6542
0b30f45d-3c54-4926-a32f-8a1dc077eb21
-
encryption_key
799E5C34BA6EC18D72E269D0C5CF1A5AC1AD9277
-
install_name
windows update.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Targets
-
-
Target
ffa58ebc168e4a19c311097b97645a5d8801db2326f4e8784b634c3e2e2de991.exe
-
Size
1.4MB
-
MD5
c28ef8671a7f140f9385ab177e38844b
-
SHA1
4cc35c23f2ce252413249ecd2ea47967fc00d5a4
-
SHA256
ffa58ebc168e4a19c311097b97645a5d8801db2326f4e8784b634c3e2e2de991
-
SHA512
6ce012bf3c1024eef4a47f54c86e3819175816d6c39bfa2216d1d522fc9612637473d8c6be2f4f203f52fc38c2bf887ed6e748ff5c18ee960fb0d82014ade82a
-
SSDEEP
12288:2fcOokxZ4FK9VlPprK7w5NljuDvdLwLEcXq8dxSaDygxpy3nZOJcllvB:2P8FMhQiXhxkKcOUv
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Suspicious use of SetThreadContext
-