General
-
Target
8cbbbbc1432a5368e903073e28c54603.bin
-
Size
394KB
-
Sample
241120-bt7wbsxhnn
-
MD5
12181f8199a7570dc7efda015bba93f8
-
SHA1
ffe3bc16028aac9ac2f8dddcc8f0977256fd0db8
-
SHA256
dce9a2540095326097381b7609b1f5a2481a3cd9f7089c4a65d42a1b9a2378b6
-
SHA512
6f423520998ae7338e0b23fb0a8320d0be3a6f66eb4caa0016b221199aded0812dd1dd108415777f6509a9089adb26c8752ebbb471c5dddd73f8d6ffdbb34ca8
-
SSDEEP
12288:2AUu7HHoG/38pPGOXrUijz9EFLMscke62t:2AUuDoA3wPGO7Uuz9EyLt
Static task
static1
Behavioral task
behavioral1
Sample
New Purchase Order-0304243220- SMART SOURCING INC.pdf____________________________________________________.exe
Resource
win7-20240708-en
Malware Config
Extracted
quasar
1.4.1
Chim
aboushagor.ydns.eu:6542
0b30f45d-3c54-4926-a32f-8a1dc077eb21
-
encryption_key
799E5C34BA6EC18D72E269D0C5CF1A5AC1AD9277
-
install_name
windows update.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Targets
-
-
Target
New Purchase Order-0304243220- SMART SOURCING INC.pdf____________________________________________________.exe
-
Size
1.4MB
-
MD5
c28ef8671a7f140f9385ab177e38844b
-
SHA1
4cc35c23f2ce252413249ecd2ea47967fc00d5a4
-
SHA256
ffa58ebc168e4a19c311097b97645a5d8801db2326f4e8784b634c3e2e2de991
-
SHA512
6ce012bf3c1024eef4a47f54c86e3819175816d6c39bfa2216d1d522fc9612637473d8c6be2f4f203f52fc38c2bf887ed6e748ff5c18ee960fb0d82014ade82a
-
SSDEEP
12288:2fcOokxZ4FK9VlPprK7w5NljuDvdLwLEcXq8dxSaDygxpy3nZOJcllvB:2P8FMhQiXhxkKcOUv
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Suspicious use of SetThreadContext
-