General
-
Target
Foto DC.png
-
Size
1.4MB
-
Sample
241122-2w14nsxmgr
-
MD5
0ab308fbdda54c8fd7c04b7e0c0fffb4
-
SHA1
7a0bbe6f6f943e97fc47224505587549c7d6df1d
-
SHA256
0565d80022e4035fe21f5fa489a866fe24b9bbcd58e68a82f61df89aec623ee8
-
SHA512
5866b071e8838a5d4b6e31bf01d70acbefb70a2ee3d6f9ffd9b1e820f5d2e27f2c1fef33c0f517025df4b8bbad9d9928f913a4fbe0ed634a6d0f5c6d89030437
-
SSDEEP
24576:kvghhDIDQ57xL24Vr62E1KOvCG2USqro2F5HGa3chp0tRPb64GHwxnt:OwDI857xL24OKOv+Zqc2F5MhpQRPG4GS
Static task
static1
Malware Config
Extracted
quasar
-
reconnect_delay
5000
Extracted
quasar
1.3.0.0
Office04
10.127.0.210:4782
QSR_MUTEX_VxGlxWsqilIBkKwFHx
-
encryption_key
9Dda4rNsdoW46bMmjQZV
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
quasar
1.4.1
Office04
10.127.0.210:4782
6935cf5e-d059-43aa-9ca1-b346ab9507bb
-
encryption_key
E9872268753A7D72DA867CBC7D6208F50BD3F8EE
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
Foto DC.png
-
Size
1.4MB
-
MD5
0ab308fbdda54c8fd7c04b7e0c0fffb4
-
SHA1
7a0bbe6f6f943e97fc47224505587549c7d6df1d
-
SHA256
0565d80022e4035fe21f5fa489a866fe24b9bbcd58e68a82f61df89aec623ee8
-
SHA512
5866b071e8838a5d4b6e31bf01d70acbefb70a2ee3d6f9ffd9b1e820f5d2e27f2c1fef33c0f517025df4b8bbad9d9928f913a4fbe0ed634a6d0f5c6d89030437
-
SSDEEP
24576:kvghhDIDQ57xL24Vr62E1KOvCG2USqro2F5HGa3chp0tRPb64GHwxnt:OwDI857xL24OKOv+Zqc2F5MhpQRPG4GS
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1