Analysis
-
max time kernel
99s -
max time network
116s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
15-12-2024 20:17
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
6ce24e7a1a552cf2bb5312453e9d6f2b
-
SHA1
ece1c2ad510d47b92c71a5d5621232664d046e78
-
SHA256
e4c44648d9bf079895414fe31e727a3c75dfaca93a06c271f50b61ce49337674
-
SHA512
81b2baf9d4585f481bcb423b8b578c9e7b9509a6bcaaaaff977d52a550d8a5897b37f944fc327fd5ea74eb214012f0724670172f488c0dbab4d3ece442b31aa3
-
SSDEEP
49152:SvWI22SsaNYfdPBldt698dBcjHnVRJ6IbR3LoGdLTHHB72eh2NT:Sv722SsaNYfdPBldt6+dBcjHnVRJ6i
Malware Config
Extracted
Family
quasar
Version
1.4.1
Botnet
KDOTCrypt
C2
forq.share.zrok.io:7000
Mutex
417ef71d-ad1d-49a7-bc17-ae3b952a30dc
Attributes
-
encryption_key
92470F4731518ABFA77DC89068544FB7E7B7C459
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/816-1-0x0000000000140000-0x0000000000464000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 816 Client-built.exe