General
-
Target
sigma.exe
-
Size
3.1MB
-
Sample
241218-nghrwswqgx
-
MD5
de0f824e7b0c9bbcfaeda08542365e85
-
SHA1
0a763f50b32c2168aa95d690bea47e9b6a17079a
-
SHA256
ae4ad769bf337a6181a3c58c7bb87ab012a2c238833ed3e9bafc67ce11788e84
-
SHA512
bcbc14d334aa17f2e1ad0a6dcf53dc87e7435eb4c72f55dd837f8384a6458c61168d34129a3270812d4b23650b762af0946b8df3fc2a3d747410271da6bf1875
-
SSDEEP
49152:Pv6lL26AaNeWgPhlmVqvMQ7XSKmnxOEMkVk/Jx1oGdEVWTHHB72eh2NT:PviL26AaNeWgPhlmVqkQ7XSKmnxQj
Behavioral task
behavioral1
Sample
sigma.exe
Resource
win11-20241007-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.35:4782
f0e2a556-a493-438f-96ae-a0a36490d4a7
-
encryption_key
2E8E60D973DF9D3760020D9B3785B9D56136B0B0
-
install_name
xbox-connect settings.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
xbox
Targets
-
-
Target
sigma.exe
-
Size
3.1MB
-
MD5
de0f824e7b0c9bbcfaeda08542365e85
-
SHA1
0a763f50b32c2168aa95d690bea47e9b6a17079a
-
SHA256
ae4ad769bf337a6181a3c58c7bb87ab012a2c238833ed3e9bafc67ce11788e84
-
SHA512
bcbc14d334aa17f2e1ad0a6dcf53dc87e7435eb4c72f55dd837f8384a6458c61168d34129a3270812d4b23650b762af0946b8df3fc2a3d747410271da6bf1875
-
SSDEEP
49152:Pv6lL26AaNeWgPhlmVqvMQ7XSKmnxOEMkVk/Jx1oGdEVWTHHB72eh2NT:PviL26AaNeWgPhlmVqkQ7XSKmnxQj
-
Quasar family
-
Quasar payload
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1