General
-
Target
TransferenciaInterbancaria.xlsx.exe
-
Size
875KB
-
Sample
241209-m4kz4avpgy
-
MD5
45ceeacf3abe7ed79b516d9f8a2a38da
-
SHA1
9dde49444c02e49ef15a885214a16dae2727ef1e
-
SHA256
b63d3105f4cc32fd098e2e780226965dac57cfb59be41705d14c4999413b39dd
-
SHA512
8c3128828df7d0ed0594f4273a2d8d66e66f43d4fe68fbef3ebc1e711324de7a7ce0db0c5c21fa1c8390a5ebb1d53ce9ff3f60bb57af31d7048c236a30d1b978
-
SSDEEP
12288:rDFW+bJWI5jPjdTYoeT2NecNhoU1JWE2rFoMuMK:FW+bJWIvLNemaU1/M
Static task
static1
Behavioral task
behavioral1
Sample
TransferenciaInterbancaria.xlsx.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
mx
ert43w221.ydns.eu:6298
7a41955f-eb2f-4ca4-8f9f-5e9bfadf0810
-
encryption_key
799E5C34BA6EC18D72E269D0C5CF1A5AC1AD9277
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Targets
-
-
Target
TransferenciaInterbancaria.xlsx.exe
-
Size
875KB
-
MD5
45ceeacf3abe7ed79b516d9f8a2a38da
-
SHA1
9dde49444c02e49ef15a885214a16dae2727ef1e
-
SHA256
b63d3105f4cc32fd098e2e780226965dac57cfb59be41705d14c4999413b39dd
-
SHA512
8c3128828df7d0ed0594f4273a2d8d66e66f43d4fe68fbef3ebc1e711324de7a7ce0db0c5c21fa1c8390a5ebb1d53ce9ff3f60bb57af31d7048c236a30d1b978
-
SSDEEP
12288:rDFW+bJWI5jPjdTYoeT2NecNhoU1JWE2rFoMuMK:FW+bJWIvLNemaU1/M
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Suspicious use of SetThreadContext
-