General
-
Target
c63218f9ea9fcd899216ecf7f802c4c7c94c633d8c404ecf9be30adbdee00e5f
-
Size
3.6MB
-
Sample
241203-ky692aykcy
-
MD5
588611722edba47986505c9e9234de19
-
SHA1
4ff6ffe18edca69cf8673ca91f6bfc8fb1a050a5
-
SHA256
c63218f9ea9fcd899216ecf7f802c4c7c94c633d8c404ecf9be30adbdee00e5f
-
SHA512
84c03cfe1d29827027e3096c1c213e9244dba7f5e76c5b9e921e1a1f22f5a23bca8337c45fc6b9bb84c622323bd75d5a6259afb6a164305644fd2068e9f70c86
-
SSDEEP
49152:z6K3X67d1TXH2/yi4VsKLVo7VYH8tOVQPkWpGe28sFqklOksXbWWzhP0aCJW3kCz:z6Kn67LG6F+ZYAOOVzsFqkEvuaCSqIj
Static task
static1
Behavioral task
behavioral1
Sample
Zamówienie - 021224 - 901003637.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
DAVID
hoffmann3.ydns.eu:5829
532aca2b-96ff-44aa-9213-031e975919ac
-
encryption_key
C5B555A83D127A9553D4FB1FCECB35CE8E91A447
-
install_name
outlooks.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Outlooks
-
subdirectory
WindowsUpdates
Targets
-
-
Target
Zamówienie - 021224 - 901003637.com
-
Size
3.7MB
-
MD5
15f259b30ec72a5217144834f7f5b564
-
SHA1
baed3fe7d059a497f856e263431ccd3872ef1ea1
-
SHA256
01de053d9560d419f0b6c35dbddb1175eb1fd7a21450989332024b812d39c4c2
-
SHA512
5e1148a9cf8008b7c38d067ec34e5c3bc7255341d114476532f8111ea2c3e654eb70b0a439aaaea22543576f09b9cec269f9b3414a6a24fc54b89c7c677c5f47
-
SSDEEP
98304:ZrAsTIZbqqBQjwske/pCT66UNYekeWY0CE9:ZcCSL0ke/pO5ekeWtCE9
-
Quasar family
-
Quasar payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-