General
-
Target
jjsploits.exe
-
Size
1.7MB
-
Sample
241203-qhegzaxjbv
-
MD5
2d225cd9a4e9a9f60997596fe0352730
-
SHA1
b7de45d930dd5ee2f0995e9d733a8699f67945d7
-
SHA256
b88778620ae5d78d22ebd16c16f92f02e3102f076f485f15636ee7b9f1357b6c
-
SHA512
5e0c3ee82703675563ccc998033c472502d65f8f0b087c773e331ca98a4d6ea5c61fdc442501f8e3748c07119d2907175785f0c7a1917e8267531f4f73f02bee
-
SSDEEP
49152:ENWHH/MpBPjSl6r2aJh82RjsoeCm9fHQIzZU9:ENOfuSrMS0srF9dS9
Static task
static1
Behavioral task
behavioral1
Sample
jjsploits.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.56.1:4782
720cb9d9-4048-4d3e-932e-6f9cd3ceb802
-
encryption_key
767E88DA40E4C28501E7DF4CF7F3D9BD448C27E7
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
WIndowsUpdSys
-
subdirectory
SubDir
Targets
-
-
Target
jjsploits.exe
-
Size
1.7MB
-
MD5
2d225cd9a4e9a9f60997596fe0352730
-
SHA1
b7de45d930dd5ee2f0995e9d733a8699f67945d7
-
SHA256
b88778620ae5d78d22ebd16c16f92f02e3102f076f485f15636ee7b9f1357b6c
-
SHA512
5e0c3ee82703675563ccc998033c472502d65f8f0b087c773e331ca98a4d6ea5c61fdc442501f8e3748c07119d2907175785f0c7a1917e8267531f4f73f02bee
-
SSDEEP
49152:ENWHH/MpBPjSl6r2aJh82RjsoeCm9fHQIzZU9:ENOfuSrMS0srF9dS9
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-