General
-
Target
nurjhrgbv.exe
-
Size
3.1MB
-
Sample
241208-zyrxnsyqbm
-
MD5
55583e9982ac74b4e17da2004552e5da
-
SHA1
da79fa80ff490c251c4e1b56051b86b8ab867292
-
SHA256
19c73e461bc7f6419aa3a7bdb1c953f0ec0c28fcd08a989094673cdcd1348c39
-
SHA512
699bcb5165b90a7ee7a591e2dc3028eb1f295cd40f6c6ed307d636fae3070b5a4e69ae7cc557d733462e33ffcaed4c3b1afd66b89eceb5479f1b0c11177de337
-
SSDEEP
49152:rvrI22SsaNYfdPBldt698dBcjHKp61JVLoGdtuWTHHB72eh2NT:rvU22SsaNYfdPBldt6+dBcjHKpg
Behavioral task
behavioral1
Sample
nurjhrgbv.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
nurjhrgbv.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
quasar
1.4.1
roar
weopgtjkjgserhgsfd-43392.portmap.host:43392
f8cb2dc4-1bf5-48cb-8213-fa8d6f92d388
-
encryption_key
C5904FDD788EA00F921C538B9FE80C0B0A0DE728
-
install_name
roar.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
discord
-
subdirectory
SubDir
Targets
-
-
Target
nurjhrgbv.exe
-
Size
3.1MB
-
MD5
55583e9982ac74b4e17da2004552e5da
-
SHA1
da79fa80ff490c251c4e1b56051b86b8ab867292
-
SHA256
19c73e461bc7f6419aa3a7bdb1c953f0ec0c28fcd08a989094673cdcd1348c39
-
SHA512
699bcb5165b90a7ee7a591e2dc3028eb1f295cd40f6c6ed307d636fae3070b5a4e69ae7cc557d733462e33ffcaed4c3b1afd66b89eceb5479f1b0c11177de337
-
SSDEEP
49152:rvrI22SsaNYfdPBldt698dBcjHKp61JVLoGdtuWTHHB72eh2NT:rvU22SsaNYfdPBldt6+dBcjHKpg
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-