General
-
Target
598e9e785106149f7c6b15754cfff25dc9e63c9a4f31dd2adfae9f89ee7114c6
-
Size
2.9MB
-
Sample
241127-rb5agswnbw
-
MD5
35ebffea09e4aaa9d51739350ed89cf3
-
SHA1
79497ec75bfa2908a7309dd32950706c1dff55f3
-
SHA256
598e9e785106149f7c6b15754cfff25dc9e63c9a4f31dd2adfae9f89ee7114c6
-
SHA512
333f8321a560a82dc63b25354174e9757ff9e9c4b531bd5a28a667da791e5c41902597f1ae22eee6631e8bd82aab4ea8ba06ef8193c435ca63d7cf5c35952b18
-
SSDEEP
49152:5XEhhcszRwpZBYWmvU0CDNB7gQ18drEXl7SY:5XEhHMBLbDNB7gQiWXl7b
Static task
static1
Behavioral task
behavioral1
Sample
598e9e785106149f7c6b15754cfff25dc9e63c9a4f31dd2adfae9f89ee7114c6.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.0.0
CLOUD
clouddns.ydns.eu:4782
Y0L5BBr3LYevMGkjTR
-
encryption_key
NQFoBAkHvOScg2EgzstO
-
install_name
CasPol.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
AppLaunch
-
subdirectory
ResourceWindows
Targets
-
-
Target
598e9e785106149f7c6b15754cfff25dc9e63c9a4f31dd2adfae9f89ee7114c6
-
Size
2.9MB
-
MD5
35ebffea09e4aaa9d51739350ed89cf3
-
SHA1
79497ec75bfa2908a7309dd32950706c1dff55f3
-
SHA256
598e9e785106149f7c6b15754cfff25dc9e63c9a4f31dd2adfae9f89ee7114c6
-
SHA512
333f8321a560a82dc63b25354174e9757ff9e9c4b531bd5a28a667da791e5c41902597f1ae22eee6631e8bd82aab4ea8ba06ef8193c435ca63d7cf5c35952b18
-
SSDEEP
49152:5XEhhcszRwpZBYWmvU0CDNB7gQ18drEXl7SY:5XEhHMBLbDNB7gQiWXl7b
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-