General
-
Target
RFQ7-82927766783 WF242183 TRGR-989789-875473657.xlsx.arj
-
Size
34KB
-
Sample
241125-rfaaxazpht
-
MD5
0dcf1c8d2873642fb3cc75a5fc8a2f52
-
SHA1
bee2d530adf9fa1d006d6763bffa7376ac7406df
-
SHA256
92db8e4b3d6b4d90a8959bd647f0b928e3cb98c5c4cb1e757b187baba1379f83
-
SHA512
e90d90af17ee1968056ed431f9adae4bad888aa7e1c2f7c0bb657b2055c716823ae46aad3c339a80996c7ea164577fd51c513efa03bea353ac9c13807163f77f
-
SSDEEP
768:SYObJc37S/V5tikOc5GVDL9nCo85Kh5bUAhMiJH8CeMw:SCgEkOb3IKh5bUAK0HJLw
Static task
static1
Behavioral task
behavioral1
Sample
RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
chi
ert43w221.ydns.eu:6298
db1ec7b2-f77c-4b56-b5fd-a1430b0b26b9
-
encryption_key
799E5C34BA6EC18D72E269D0C5CF1A5AC1AD9277
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Targets
-
-
Target
RFQ7-82927766783 WF242183 TRGR-989789引流管 中性.xlsx.exe
-
Size
82KB
-
MD5
5405c36dca0a57d8a6632550b0cba212
-
SHA1
9f487e0902b7c39a4c4dd8dd9e918dc3dc10245c
-
SHA256
8d429a2e8f8b5403c44cb7597598c2ba18a40ccb464f2997426d3eefbbd888c0
-
SHA512
c699a965e289613d31f699494328f9570abc61ea437ab199afbb266c923c9383c366e3f4bec1de27614f2d9672de5449ee39e0d3614df3f315a2b64fad2e8e6b
-
SSDEEP
1536:eKPDl0ZVabbkg9ot5dR7GqPoS95sRvWQONAjzGX+:eKPDOZVEbkg6lKC0eBNAjzV
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Suspicious use of SetThreadContext
-