Analysis
-
max time kernel
91s -
max time network
92s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
15-12-2024 20:40
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
8152b58d673e401055d6aea447b6bab8
-
SHA1
4de077751ceb052f7d0a08b0b60c7db31cc32df4
-
SHA256
b40ab88284056dea6bd46ad04b674f48d67fc7cdd00f3e89dcfa225d233ab3bd
-
SHA512
4eb3924d002b2ca1070ba2256177c38614b531207136561aa56948b776d61acae695e91ce6d8b967003a328ab1933438c55627ec21df77de8f3216b7044e4075
-
SSDEEP
49152:rvWI22SsaNYfdPBldt698dBcjHBCz1JjLoGdKuTHHB72eh2NT:rv722SsaNYfdPBldt6+dBcjHBCDa
Malware Config
Extracted
Family
quasar
Version
1.4.1
Botnet
KDOTCrypt
C2
159.203.126.35:22653
Mutex
417ef71d-ad1d-49a7-bc17-ae3b952a30dc
Attributes
-
encryption_key
92470F4731518ABFA77DC89068544FB7E7B7C459
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/5072-1-0x0000000000950000-0x0000000000C74000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5072 Client-built.exe