Analysis
-
max time kernel
95s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
a06fb340d32ab66caf6d851719c4e51e77a3208b337a0bca99879cfaba35d2c7.exe
Resource
win7-20240903-en
General
-
Target
a06fb340d32ab66caf6d851719c4e51e77a3208b337a0bca99879cfaba35d2c7.exe
-
Size
8.6MB
-
MD5
18614ee994ac149ba306d530651d627c
-
SHA1
fbb67a2e7723e9c08b9faba8a4e5b1104ffefaed
-
SHA256
a06fb340d32ab66caf6d851719c4e51e77a3208b337a0bca99879cfaba35d2c7
-
SHA512
013aa8b9e32b17980906f44dd8e77deb1f81ed6520972a20bf8639cfb42d825ee6a4000cdcfc31071c1bd9c3dbee51613f53e859e771d3428747bbd646105af9
-
SSDEEP
98304:sX6BNhy0K9ZrLuJipnDfuvmrdLqEWsEtzo9aBN6K+tFXLx04:cuhy0+xLuJipDmc5Pnakxq4
Malware Config
Extracted
quasar
1.4.1
Bat IS
51.15.17.193:4782
4cdc792e-d5cc-4480-93ab-ecbd2e6b9073
-
encryption_key
97599F6E5D14A784CC4DD36B18A277119042FDA8
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/2992-1-0x000001EDE3A50000-0x000001EDE3D74000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2992 a06fb340d32ab66caf6d851719c4e51e77a3208b337a0bca99879cfaba35d2c7.exe