General
-
Target
alyemenione.lnk
-
Size
2KB
-
Sample
241218-1zgzjatmaz
-
MD5
12ca834e507ca967d01911cec7454312
-
SHA1
2d43271a7ec861f87da9bdeced53bd9bb20986ff
-
SHA256
9dd34887a7aa11ba28a8e63d484274110ab40a6ad7035f8ff93c19c12ec66542
-
SHA512
b3033aab1d18a50957e698bf0dbdaa3e8245f1a74bc7129b486d1ee2f0c5164998603616b48cc67fd4e8cca7bcc40c36ca51e7a5ccf6c54fe02277615c9de4fa
Static task
static1
Behavioral task
behavioral1
Sample
alyemenione.lnk
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
P1
cdn-streaming.com:80
65768f90-1bce-4e20-baef-7e1bf22954c2
-
encryption_key
63161500A624B0A692FDDA0CDFB535E14955CE8F
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
5000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
alyemenione.lnk
-
Size
2KB
-
MD5
12ca834e507ca967d01911cec7454312
-
SHA1
2d43271a7ec861f87da9bdeced53bd9bb20986ff
-
SHA256
9dd34887a7aa11ba28a8e63d484274110ab40a6ad7035f8ff93c19c12ec66542
-
SHA512
b3033aab1d18a50957e698bf0dbdaa3e8245f1a74bc7129b486d1ee2f0c5164998603616b48cc67fd4e8cca7bcc40c36ca51e7a5ccf6c54fe02277615c9de4fa
-
Quasar family
-
Quasar payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-