General
-
Target
Update.exe
-
Size
413KB
-
Sample
241201-yjne9szmfw
-
MD5
a47bdfa348d4ed9f8203656f8a62499a
-
SHA1
7247d8dd2f0ee2f17164ceaac818952991dd8899
-
SHA256
d84951f196002ba7b00af849ecb2b29ea9e61b3cee7a0dadb6fd595da3bd60b4
-
SHA512
9ae9a0591684c34d3c0e883b8ca7275405c4c22cd80f6505e31aef86dff91ed97419d7a78727620e5a5b4d7e40f9e3fee4a2f85fc29c607d258108c9bb3c209c
-
SSDEEP
6144:qNmEjkzQT1TVNe6AsBq61H+crK8mlbb/z3WdYfBJcxsq3GM:u1TVVwK1H+QPmxWKfBJcxsSGM
Malware Config
Extracted
quasar
3.1.5
Office04
me-intranet.gl.at.ply.gg:13055
$Sxr-plkPjnJnOsZ1prJqWh
-
encryption_key
sF4pQelXUnjCz70tuoBe
-
install_name
COM Surrogate.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
COM Surrogate
-
subdirectory
Windows
Targets
-
-
Target
Update.exe
-
Size
413KB
-
MD5
a47bdfa348d4ed9f8203656f8a62499a
-
SHA1
7247d8dd2f0ee2f17164ceaac818952991dd8899
-
SHA256
d84951f196002ba7b00af849ecb2b29ea9e61b3cee7a0dadb6fd595da3bd60b4
-
SHA512
9ae9a0591684c34d3c0e883b8ca7275405c4c22cd80f6505e31aef86dff91ed97419d7a78727620e5a5b4d7e40f9e3fee4a2f85fc29c607d258108c9bb3c209c
-
SSDEEP
6144:qNmEjkzQT1TVNe6AsBq61H+crK8mlbb/z3WdYfBJcxsq3GM:u1TVVwK1H+QPmxWKfBJcxsSGM
-
Quasar family
-
Quasar payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
6System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1