General
-
Target
33c16415bb86e33f9c9b5e37a20b875df320cc40f5a1d8d7c067279f1ca04b4bN.exe
-
Size
3.8MB
-
Sample
241129-jcxm2asrfy
-
MD5
74eda795d396603a1b46b93eb10d72f0
-
SHA1
5ef9985f0ebb66336125f4751c7da012582c9dd4
-
SHA256
33c16415bb86e33f9c9b5e37a20b875df320cc40f5a1d8d7c067279f1ca04b4b
-
SHA512
ef87c84b8d8238d8cbf58b2db4f06cabcd9f5c6471e73d5c30f877084586045dbe9ee47ac275bf59d37b66b9aa2a41809561d0aa3dcae43400c0f1537c5668c4
-
SSDEEP
98304:CUBpeT0riOfERBGWQMYEUDPeuetEnEP4UTfGpFvMvh1u:CUBpeT0unRPQhCuMKUbGpxch1u
Static task
static1
Behavioral task
behavioral1
Sample
33c16415bb86e33f9c9b5e37a20b875df320cc40f5a1d8d7c067279f1ca04b4bN.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
26-11
maxigym.net:4782
579ac83a-8fa5-4dbc-8dcc-c76fafec1a69
-
encryption_key
DD459BB92A43EF8EEB2FE401C8453F685AECE590
-
install_name
ChromiumDaemon.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Chromium Extentions Service
-
subdirectory
ChromiumExtentions
Targets
-
-
Target
33c16415bb86e33f9c9b5e37a20b875df320cc40f5a1d8d7c067279f1ca04b4bN.exe
-
Size
3.8MB
-
MD5
74eda795d396603a1b46b93eb10d72f0
-
SHA1
5ef9985f0ebb66336125f4751c7da012582c9dd4
-
SHA256
33c16415bb86e33f9c9b5e37a20b875df320cc40f5a1d8d7c067279f1ca04b4b
-
SHA512
ef87c84b8d8238d8cbf58b2db4f06cabcd9f5c6471e73d5c30f877084586045dbe9ee47ac275bf59d37b66b9aa2a41809561d0aa3dcae43400c0f1537c5668c4
-
SSDEEP
98304:CUBpeT0riOfERBGWQMYEUDPeuetEnEP4UTfGpFvMvh1u:CUBpeT0unRPQhCuMKUbGpxch1u
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1