General
-
Target
OperaGXSetup (41).exe
-
Size
3.8MB
-
Sample
241228-plre9sxqgx
-
MD5
f6a94c99deff44303f682dd2bb7d3d12
-
SHA1
f2c6fa65a69a67a3e2120cfbb61511a495c18688
-
SHA256
28eb5915b45f87b4ff342dbfb0122757217e79277770e9fd06a6342009c56829
-
SHA512
16edb4c4ef94a0e19088c69a3150fc2f0e158e707eb8a4a085d7e95eecde2fbdc4bdd1afbb3fc0b13d179d2a4e60f60de14a4224a998dfb6d944dea6441ec3ec
-
SSDEEP
49152:ZVAbwA+j3AtriaXicL8D8nqdZqb8oM28CBHmLOIt/ZwDAakqbMz3Lnn7cAWFJJL:PA+jxJIfMKmLOIt/yDh7MbLnnXWFv
Static task
static1
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.56.1:4782
87f91b59-5c0a-4fdb-a6da-c0d91c465167
-
encryption_key
2BAF13F1E7F5D90A54B973408B090D5AE355EEAE
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
EpicGames
-
subdirectory
SubDir
Targets
-
-
Target
OperaGXSetup (41).exe
-
Size
3.8MB
-
MD5
f6a94c99deff44303f682dd2bb7d3d12
-
SHA1
f2c6fa65a69a67a3e2120cfbb61511a495c18688
-
SHA256
28eb5915b45f87b4ff342dbfb0122757217e79277770e9fd06a6342009c56829
-
SHA512
16edb4c4ef94a0e19088c69a3150fc2f0e158e707eb8a4a085d7e95eecde2fbdc4bdd1afbb3fc0b13d179d2a4e60f60de14a4224a998dfb6d944dea6441ec3ec
-
SSDEEP
49152:ZVAbwA+j3AtriaXicL8D8nqdZqb8oM28CBHmLOIt/ZwDAakqbMz3Lnn7cAWFJJL:PA+jxJIfMKmLOIt/yDh7MbLnnXWFv
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1