General
-
Target
bannas.exe
-
Size
348KB
-
Sample
241214-y8frqavmhl
-
MD5
7500a9269a35b159e854312282732728
-
SHA1
5b3d03a59af9e662f84fb2ab113e6275a9d502af
-
SHA256
8b776eb44e02df10fec47058feac9cc18d0f169370ebf7cbd9f0f0b7b66c99f9
-
SHA512
3d46a5cec0dfc5b14381e21c096d0a9d094e6971629eada7fa4a3ddac7ac2192ff69c1c73b627447092d6589caab350fea14235cfbb380a364dba14969a7487f
-
SSDEEP
6144:wk+zrEsiN1PDA3COn7bblr71T2fJYUzsgNkd:dxsiNczZsf2UzXkd
Behavioral task
behavioral1
Sample
bannas.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.3.0.0
Office04
localhost:4781
192.168.1.159:4781
skibiditoilet.hopto.org:4781
86.175.70.140:4781
QSR_MUTEX_86QM62MaEKfEyd8OVt
-
encryption_key
zZvCiezIyCBIqqTBUeKo
-
install_name
security2.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
security2
-
subdirectory
skibidi
Targets
-
-
Target
bannas.exe
-
Size
348KB
-
MD5
7500a9269a35b159e854312282732728
-
SHA1
5b3d03a59af9e662f84fb2ab113e6275a9d502af
-
SHA256
8b776eb44e02df10fec47058feac9cc18d0f169370ebf7cbd9f0f0b7b66c99f9
-
SHA512
3d46a5cec0dfc5b14381e21c096d0a9d094e6971629eada7fa4a3ddac7ac2192ff69c1c73b627447092d6589caab350fea14235cfbb380a364dba14969a7487f
-
SSDEEP
6144:wk+zrEsiN1PDA3COn7bblr71T2fJYUzsgNkd:dxsiNczZsf2UzXkd
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-