General
-
Target
burpsuite2.2.EXE
-
Size
208.5MB
-
Sample
241126-h3b9cazrb1
-
MD5
e65eadc039a63720027b5806936bb1f6
-
SHA1
608d8d9ef45b0bf71257078ca8a68bcd5fe1ec49
-
SHA256
99df601daf636cfc09df2eeceb7a9bcbb98c0798eac147f379cfcb2c2853d69c
-
SHA512
d113f24f4be83c71142df7a19c0c67da89a7e79286692621c8da03f30c0ec18ff2e4dd6957d5a8c7b3e05354cb26428a873fc04909ceb5800e5ef9021126bcd1
-
SSDEEP
6291456:ZY6l+mOWCkh3PjGl8bJcA8HKWEuxp5HT:m6l+mO6tPKMJUqWEuxv
Static task
static1
Malware Config
Extracted
quasar
1.3.0.0
systemsom
systemsom.ddns.net:4444
QSR_MUTEX_yUyz7QlfeoeehMJRGY
-
encryption_key
mWoA6fgoQ3ThegdvvCAD
-
install_name
shost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
mcsftt
-
subdirectory
micsft
Targets
-
-
Target
burpsuite2.2.EXE
-
Size
208.5MB
-
MD5
e65eadc039a63720027b5806936bb1f6
-
SHA1
608d8d9ef45b0bf71257078ca8a68bcd5fe1ec49
-
SHA256
99df601daf636cfc09df2eeceb7a9bcbb98c0798eac147f379cfcb2c2853d69c
-
SHA512
d113f24f4be83c71142df7a19c0c67da89a7e79286692621c8da03f30c0ec18ff2e4dd6957d5a8c7b3e05354cb26428a873fc04909ceb5800e5ef9021126bcd1
-
SSDEEP
6291456:ZY6l+mOWCkh3PjGl8bJcA8HKWEuxp5HT:m6l+mO6tPKMJUqWEuxv
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1