Analysis
-
max time kernel
93s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 20:06
Static task
static1
Behavioral task
behavioral1
Sample
d0d221d0a152430a62531fd46b7c1f43721110da2bb3ee2f5688e484b143acebN.exe
Resource
win7-20240903-en
General
-
Target
d0d221d0a152430a62531fd46b7c1f43721110da2bb3ee2f5688e484b143acebN.exe
-
Size
5.6MB
-
MD5
c549fe02bb65c0c2977c741c7ed4fd80
-
SHA1
8475e459ba2fe572c53b08c061a5b24e074832a1
-
SHA256
d0d221d0a152430a62531fd46b7c1f43721110da2bb3ee2f5688e484b143aceb
-
SHA512
b51e81d073dc1bbdeea1f0dcf66901f2996faa5f30657e354c0c9271ad0f58ce0cc20744f8287afd81904d10148032038f2bad33e45d49685f7dce73e0a52b3a
-
SSDEEP
98304:fC0lmUrXmOH9wShg7JrBAwbzWMaA/BcV6LoFU4:flmUjY/rHKAL4U4
Malware Config
Extracted
quasar
1.4.1
NEURO
51.15.17.193:4782
1f6c9ecc-c030-43a4-bbf2-21326400cbb5
-
encryption_key
97599F6E5D14A784CC4DD36B18A277119042FDA8
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2164-1-0x0000016422950000-0x0000016422C74000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d0d221d0a152430a62531fd46b7c1f43721110da2bb3ee2f5688e484b143acebN.exedescription pid Process Token: SeDebugPrivilege 2164 d0d221d0a152430a62531fd46b7c1f43721110da2bb3ee2f5688e484b143acebN.exe