Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 11:30
Static task
static1
Behavioral task
behavioral1
Sample
687c5903af67e7ae2df617f249ef22502998e4524ccb34a27eaac389b8e61728.exe
Resource
win7-20240729-en
General
-
Target
687c5903af67e7ae2df617f249ef22502998e4524ccb34a27eaac389b8e61728.exe
-
Size
4.8MB
-
MD5
9a7cea63db91937ec2fa0c4a40dcde82
-
SHA1
dbc121740eb6aa3221beadd3ae69df1ce095c441
-
SHA256
687c5903af67e7ae2df617f249ef22502998e4524ccb34a27eaac389b8e61728
-
SHA512
36e6a806125b1d80e97482f0b03a7481a136f01d2808169f171d89c54d2faf6f5b6913f4751dc737d5dc672f63622e379fd87f306cec2e076d8a5e73d33059dd
-
SSDEEP
98304:nMuUyniWYpCYL5ztUvPPpmDw7FhcNXIvNS12RA4:njifpTptUvpWw7FmNXENSV4
Malware Config
Extracted
quasar
1.4.1
Staking
51.15.17.193:4782
ff4f56ac-24e1-40ed-bb5c-e0b45b489ee4
-
encryption_key
97599F6E5D14A784CC4DD36B18A277119042FDA8
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/4932-1-0x000001FDE6E30000-0x000001FDE7154000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4932 687c5903af67e7ae2df617f249ef22502998e4524ccb34a27eaac389b8e61728.exe