General
-
Target
Registry.exe
-
Size
3.1MB
-
Sample
241213-l2q8nawqfj
-
MD5
6f154cc5f643cc4228adf17d1ff32d42
-
SHA1
10efef62da024189beb4cd451d3429439729675b
-
SHA256
bf901de5b54a593b3d90a2bcfdf0a963ba52381f542bf33299bdfcc3b5b2afff
-
SHA512
050fc8a9a852d87f22296be8fe4067d6fabefc2dec408da3684a0deb31983617e8ba42494d3dbe75207d0810dec7ae1238b17b23ed71668cc099a31e1f6539d1
-
SSDEEP
49152:KvXI22SsaNYfdPBldt698dBcjHEIW+stuoGdXTHHB72eh2NT:KvY22SsaNYfdPBldt6+dBcjH7W+sM
Behavioral task
behavioral1
Sample
Registry.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
14.243.221.170:2654
a7b38fdd-192e-4e47-b9ba-ca9eb81cc7bd
-
encryption_key
8B9AD736E943A06EAF1321AD479071E83805704C
-
install_name
Runtime Broker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Runtime Broker
-
subdirectory
SubDir
Targets
-
-
Target
Registry.exe
-
Size
3.1MB
-
MD5
6f154cc5f643cc4228adf17d1ff32d42
-
SHA1
10efef62da024189beb4cd451d3429439729675b
-
SHA256
bf901de5b54a593b3d90a2bcfdf0a963ba52381f542bf33299bdfcc3b5b2afff
-
SHA512
050fc8a9a852d87f22296be8fe4067d6fabefc2dec408da3684a0deb31983617e8ba42494d3dbe75207d0810dec7ae1238b17b23ed71668cc099a31e1f6539d1
-
SSDEEP
49152:KvXI22SsaNYfdPBldt698dBcjHEIW+stuoGdXTHHB72eh2NT:KvY22SsaNYfdPBldt6+dBcjH7W+sM
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-