General
-
Target
9764bc832bfa8a9f3d7af1ea6747e7376774bd903e9cc545d9998f2657e97fa3
-
Size
3.1MB
-
Sample
241207-v6gdpaxlgs
-
MD5
57145c33045ce67e1c1fe7c763438ab1
-
SHA1
2a83ecef8bbe640577a2cc3f6602bbd8e7d6c847
-
SHA256
9764bc832bfa8a9f3d7af1ea6747e7376774bd903e9cc545d9998f2657e97fa3
-
SHA512
7ce3d6dbd3c3b05ff6fe1ac57888123cf5e01e890c5b5e7204859b361841d15fdb8a460626355236b9c3df58824cb1979c187f34fa6d7d282517023f3a26a112
-
SSDEEP
49152:uvHI22SsaNYfdPBldt698dBcjH/N/9oGduTHHB72eh2NT:uvo22SsaNYfdPBldt6+dBcjH/Nl
Behavioral task
behavioral1
Sample
9764bc832bfa8a9f3d7af1ea6747e7376774bd903e9cc545d9998f2657e97fa3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9764bc832bfa8a9f3d7af1ea6747e7376774bd903e9cc545d9998f2657e97fa3.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.4.1
RuntimeBroker
qrpn9be.localto.net:2810
fc5edab1-6e8f-4963-98aa-bd077e08750f
-
encryption_key
F749DCAC94A1FC3102D2B0CFBBFCB76086F86568
-
install_name
RuntimeBroker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
RuntimeBroker
-
subdirectory
a7
Targets
-
-
Target
9764bc832bfa8a9f3d7af1ea6747e7376774bd903e9cc545d9998f2657e97fa3
-
Size
3.1MB
-
MD5
57145c33045ce67e1c1fe7c763438ab1
-
SHA1
2a83ecef8bbe640577a2cc3f6602bbd8e7d6c847
-
SHA256
9764bc832bfa8a9f3d7af1ea6747e7376774bd903e9cc545d9998f2657e97fa3
-
SHA512
7ce3d6dbd3c3b05ff6fe1ac57888123cf5e01e890c5b5e7204859b361841d15fdb8a460626355236b9c3df58824cb1979c187f34fa6d7d282517023f3a26a112
-
SSDEEP
49152:uvHI22SsaNYfdPBldt698dBcjH/N/9oGduTHHB72eh2NT:uvo22SsaNYfdPBldt6+dBcjH/Nl
Score10/10-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-