Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-12-2024 02:12
Behavioral task
behavioral1
Sample
23d78defb24bc7e2496d016a368054df8f7f9b64988ffcba00dab9311b7329d4.exe
Resource
win7-20240903-en
General
-
Target
23d78defb24bc7e2496d016a368054df8f7f9b64988ffcba00dab9311b7329d4.exe
-
Size
3.1MB
-
MD5
57caa771cdc49a089b783f3df4e72f99
-
SHA1
94609144f4752e594e6f569f05cea5c2f80473e0
-
SHA256
23d78defb24bc7e2496d016a368054df8f7f9b64988ffcba00dab9311b7329d4
-
SHA512
f145321b4bf217ae71855a86619faf8f17ae8f3f1f13f4611f5e7809cba5c1fe71185d8227897fb7f83741b2cc348792ae918e45d98e9c0d647dcc0f7e3ea2f0
-
SSDEEP
49152:CvWI22SsaNYfdPBldt698dBcjHM9RJ6DbR3LoGdRVTHHB72eh2NT:Cv722SsaNYfdPBldt6+dBcjHM9RJ61B
Malware Config
Extracted
quasar
1.4.1
7332
149.50.108.116:7332
41fce632-c870-4911-98d8-32bfb4cb74f3
-
encryption_key
5F29C07D7CDED6776D9E269C35195B7318EC31BE
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/3480-1-0x0000000000FB0000-0x00000000012D4000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3480 23d78defb24bc7e2496d016a368054df8f7f9b64988ffcba00dab9311b7329d4.exe