General
-
Target
registry.exe
-
Size
1KB
-
Sample
241205-pk96zstrft
-
MD5
689a1880d6c5c0af7d0e3e567fe3df23
-
SHA1
0e6f59da774e68d9aa8e18ae06865c473a721900
-
SHA256
3e2e9b64c2701ed6fdd503b5cd52dcda17909a3f9f5f0f6c6b42ef8c9ae23c95
-
SHA512
2ea34967d9a2c2478734537731fda96017e97fef4fd8ede1ec025e4fef992ca99fb8c412b15569edd697d451f26c6bce589783e0393dfe9538c158a7f1207160
Static task
static1
Behavioral task
behavioral1
Sample
registry.html
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
JonahOscendoskY-53420.portmap.host:53420
f38ec230-fd60-44ab-91a9-17577e4487f9
-
encryption_key
E127FB40EABF3C6167749BEDDDBC64167ED27B67
-
install_name
Registry.exe
-
log_directory
Logs
-
reconnect_delay
1000
-
startup_key
Registry
-
subdirectory
SubDir
Targets
-
-
Target
registry.exe
-
Size
1KB
-
MD5
689a1880d6c5c0af7d0e3e567fe3df23
-
SHA1
0e6f59da774e68d9aa8e18ae06865c473a721900
-
SHA256
3e2e9b64c2701ed6fdd503b5cd52dcda17909a3f9f5f0f6c6b42ef8c9ae23c95
-
SHA512
2ea34967d9a2c2478734537731fda96017e97fef4fd8ede1ec025e4fef992ca99fb8c412b15569edd697d451f26c6bce589783e0393dfe9538c158a7f1207160
-
Quasar family
-
Quasar payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops file in System32 directory
-