General
-
Target
03b2932cc0f1fff6bf01c1e561ad3b02b0e3db0c9cacd02f4f3198902b1ad7dfN.exe
-
Size
3.1MB
-
Sample
241210-1ycnes1nfw
-
MD5
59f414f74a8a0bae1a8ff0ea4b045020
-
SHA1
23500e649843bf0e3075da18b3c5789dc4fa6505
-
SHA256
03b2932cc0f1fff6bf01c1e561ad3b02b0e3db0c9cacd02f4f3198902b1ad7df
-
SHA512
a471c66f59311fc97dada64846a9c10109c3d455f8673b2c09f09f4513370d5384cb6509b63f549a212efefef33c37d0dda9225c49dd44b45f50fc3d42ff0d62
-
SSDEEP
49152:zvelL26AaNeWgPhlmVqvMQ7XSKjizD+YMfrDoGdfTHHB72eh2NT:zvOL26AaNeWgPhlmVqkQ7XSKjizD+L
Behavioral task
behavioral1
Sample
03b2932cc0f1fff6bf01c1e561ad3b02b0e3db0c9cacd02f4f3198902b1ad7dfN.exe
Resource
win7-20241023-en
Malware Config
Extracted
quasar
1.4.1
roar
fojeweb571-59106.portmap.host:59106
0c203952-83f0-40e8-a93c-b701163cc930
-
encryption_key
B42CE86AEBA4D8818352F4D811EA7BBB472E229A
-
install_name
windows defender.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
discord
-
subdirectory
SubDir
Targets
-
-
Target
03b2932cc0f1fff6bf01c1e561ad3b02b0e3db0c9cacd02f4f3198902b1ad7dfN.exe
-
Size
3.1MB
-
MD5
59f414f74a8a0bae1a8ff0ea4b045020
-
SHA1
23500e649843bf0e3075da18b3c5789dc4fa6505
-
SHA256
03b2932cc0f1fff6bf01c1e561ad3b02b0e3db0c9cacd02f4f3198902b1ad7df
-
SHA512
a471c66f59311fc97dada64846a9c10109c3d455f8673b2c09f09f4513370d5384cb6509b63f549a212efefef33c37d0dda9225c49dd44b45f50fc3d42ff0d62
-
SSDEEP
49152:zvelL26AaNeWgPhlmVqvMQ7XSKjizD+YMfrDoGdfTHHB72eh2NT:zvOL26AaNeWgPhlmVqkQ7XSKjizD+L
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-