General
-
Target
06201f911b2f736433fac73c68b2194a.exe
-
Size
4.8MB
-
Sample
241201-2cg7fszmal
-
MD5
06201f911b2f736433fac73c68b2194a
-
SHA1
4d7221f72b4b541bb7efb2a36cac419391d532ed
-
SHA256
01349efa40959e8c4653c93da14f7b11c0a6fbe54894d998970abd46ca701d6e
-
SHA512
461604e159a010cb97d39ad683aab654d4c56512c2d437f9adcaa7f51a032aec880f0c9641ede195eefb80333d0f4f329e77352856d37b0c34107965535a6b43
-
SSDEEP
49152:DTvC/MTQYxsWR7a522meghLwOqxEs08Y6m2ZyoblJP6fa:HjTQYxsWRimeghLwPx6GZyobHP
Static task
static1
Behavioral task
behavioral1
Sample
06201f911b2f736433fac73c68b2194a.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
1606
pixels.game-server.cc:1606
6d96d222-8b64-4e23-a33e-b2753466d47c
-
encryption_key
0D9465E10679C48F6CD017D507EF5A31654D1928
-
install_name
Client.exe
-
log_directory
wLogs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
06201f911b2f736433fac73c68b2194a.exe
-
Size
4.8MB
-
MD5
06201f911b2f736433fac73c68b2194a
-
SHA1
4d7221f72b4b541bb7efb2a36cac419391d532ed
-
SHA256
01349efa40959e8c4653c93da14f7b11c0a6fbe54894d998970abd46ca701d6e
-
SHA512
461604e159a010cb97d39ad683aab654d4c56512c2d437f9adcaa7f51a032aec880f0c9641ede195eefb80333d0f4f329e77352856d37b0c34107965535a6b43
-
SSDEEP
49152:DTvC/MTQYxsWR7a522meghLwOqxEs08Y6m2ZyoblJP6fa:HjTQYxsWRimeghLwPx6GZyobHP
-
Quasar family
-
Quasar payload
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-