General
-
Target
1.rar
-
Size
72KB
-
Sample
241212-k95kkszjcs
-
MD5
712a72e0b97b1b24659ab44bc77e42d2
-
SHA1
0dbf27a9c47cb8d59cca1d44769ee09ca496640c
-
SHA256
8423008e3289419542dd8d07a896ea86009dca840bf2a3bae2c24ea06808d847
-
SHA512
d22ea35745510a057ea8b5ca552cdb3cf8fbb3bca3e916ebbb8da74360ebe6025896166bb0d9e14d1fd8d0c4da93a10125518ace89a442fc1b431e04ffd814fb
-
SSDEEP
1536:RRhxo0FYmex2Phn58CiUBJwPdtzdpFKDr+7me/P/2+olEPnf3orN:HDFQI8qnwPXz4uaYP/4lEPwrN
Static task
static1
Behavioral task
behavioral1
Sample
Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe
Resource
win7-20241023-en
Malware Config
Extracted
quasar
1.4.1
onye
winera.ydns.eu:6298
4d79333b-1758-4ff2-8d36-e4612bbfd878
-
encryption_key
799E5C34BA6EC18D72E269D0C5CF1A5AC1AD9277
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
settings
-
subdirectory
SubDir
Targets
-
-
Target
Po_7837236367-386363783-Turkey-Import-sales.xlsx.exe
-
Size
174KB
-
MD5
90b63162f613ec7e392c15dbcc844750
-
SHA1
64acb9112424b2937dd3724d4460d64b5b418dbd
-
SHA256
4c5ae8b60005526d81508706a1dfc6e491a3d51bc2b0dbe2d26d2b53a25cfe50
-
SHA512
7f3057d6496895317acfadc40c620438709087f1dd61fc88ae210cb27ea036192e591287c295457c10080a380319ff98aee790264d5864668fc7f7d248e1d70b
-
SSDEEP
3072:c7DOEKsy8Jg6IlXjK1p8rlHfbbxfwIphhup6gma8f5tUzpTnZO+hOeH:H8JfcjW8rlHjb9/pXu8nOnE+N
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Suspicious use of SetThreadContext
-