General
-
Target
bf07e9ac79ed258fa40f5c00e1b06e88a7648926f9351f4b860352a7d8a1f7abN.exe
-
Size
876KB
-
Sample
241126-wedn6ayjhq
-
MD5
96ada2b7d27c62da2635104a0b1d71d0
-
SHA1
8730396d2c4adcb2b2531ca207d3338604622f15
-
SHA256
bf07e9ac79ed258fa40f5c00e1b06e88a7648926f9351f4b860352a7d8a1f7ab
-
SHA512
1084cd57f87c6610897711f2107705d9fdfacb402a9ca4cf8624c04d00d6c04cbeb239b6945484387f22e500d8afcda090379bc25f659b0f0b9fd111422b4215
-
SSDEEP
24576:weKxzRSGSL0v0mMO5PKDRwszHMC8hrAaRKG:BKxVpSL0AiyDysAC8hrZ
Static task
static1
Behavioral task
behavioral1
Sample
bf07e9ac79ed258fa40f5c00e1b06e88a7648926f9351f4b860352a7d8a1f7abN.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.3.0.0
AOY
87.120.120.27:61540
127.0.0.1:61540
87.121.86.205:61541
QSR_MUTEX_NOCv4TURf46HbVbxyc
-
encryption_key
fVsndNhImy9VosyZSQbQ
-
install_name
updates.exe
-
log_directory
Logs
-
reconnect_delay
4000
-
startup_key
Windows Update
-
subdirectory
Windows
Targets
-
-
Target
bf07e9ac79ed258fa40f5c00e1b06e88a7648926f9351f4b860352a7d8a1f7abN.exe
-
Size
876KB
-
MD5
96ada2b7d27c62da2635104a0b1d71d0
-
SHA1
8730396d2c4adcb2b2531ca207d3338604622f15
-
SHA256
bf07e9ac79ed258fa40f5c00e1b06e88a7648926f9351f4b860352a7d8a1f7ab
-
SHA512
1084cd57f87c6610897711f2107705d9fdfacb402a9ca4cf8624c04d00d6c04cbeb239b6945484387f22e500d8afcda090379bc25f659b0f0b9fd111422b4215
-
SSDEEP
24576:weKxzRSGSL0v0mMO5PKDRwszHMC8hrAaRKG:BKxVpSL0AiyDysAC8hrZ
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-