General
-
Target
Helix.rar
-
Size
5.7MB
-
Sample
241217-remjva1lgw
-
MD5
aa739d62f7cecb119d79c6dd20ce08dc
-
SHA1
c08fc2fa7c60aaccaf63bc36b97718805aa0cf0c
-
SHA256
0dfd21302019e4bfd87c80d5b8c02f2fd04e4468df4d1a2d3e9a79a60d6034f8
-
SHA512
55d055ef27f95cd789b7db207e7d06110960b103f622be46c0852af8fa9b42f4fc442c013ef37facb21116cd084d5f7c11c67ae1fbfdbf2d19579449438d9eab
-
SSDEEP
98304:pqVEctip61GQnWmL7RvzZ/Nf8g9KAywc7ebbPF4LE+cnZLK5lANp1P1NLGXN:pqliAGYf3/Nf99KArcKfPSbcn1dB19G9
Static task
static1
Behavioral task
behavioral1
Sample
Helix.rar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Helix.rar
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
-
encryption_key
61554134DA31ADB781F8872F6AA979DB23F475C2
-
reconnect_delay
3000
Targets
-
-
Target
Helix.rar
-
Size
5.7MB
-
MD5
aa739d62f7cecb119d79c6dd20ce08dc
-
SHA1
c08fc2fa7c60aaccaf63bc36b97718805aa0cf0c
-
SHA256
0dfd21302019e4bfd87c80d5b8c02f2fd04e4468df4d1a2d3e9a79a60d6034f8
-
SHA512
55d055ef27f95cd789b7db207e7d06110960b103f622be46c0852af8fa9b42f4fc442c013ef37facb21116cd084d5f7c11c67ae1fbfdbf2d19579449438d9eab
-
SSDEEP
98304:pqVEctip61GQnWmL7RvzZ/Nf8g9KAywc7ebbPF4LE+cnZLK5lANp1P1NLGXN:pqliAGYf3/Nf99KArcKfPSbcn1dB19G9
Score10/10-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-