General
-
Target
832c978576aca4163e3c3127e622316794836b1e634b4128797fc9493ff57105
-
Size
3.2MB
-
Sample
241230-a22hvaskcj
-
MD5
a385e16864e1ac30f23dd08e87b93319
-
SHA1
987c3448486e401936e928abc52cf80780fb2d37
-
SHA256
832c978576aca4163e3c3127e622316794836b1e634b4128797fc9493ff57105
-
SHA512
e2099df125c1ca9dfbaddd6ec89dadf94fcce7dd8c298958a53a8b0d0e52d91c0b26f8d1746ec72d5527594d678ec19c29f4849994d268fbdb6200a5c13c7699
-
SSDEEP
49152:tgviI22SsaNYfdPBldt698dBcjHq1SQoGv5lpTHHB72eh2NTf:mvv22SsaNYfdPBldt6+dBcjHq19x8
Behavioral task
behavioral1
Sample
832c978576aca4163e3c3127e622316794836b1e634b4128797fc9493ff57105.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
193.161.193.99:43242
45bfb701-bea2-411a-948d-9a6abe001f83
-
encryption_key
80594967BC0A4839C316A44D62DE36E9BF18177F
-
install_name
SYSTEM26.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
832c978576aca4163e3c3127e622316794836b1e634b4128797fc9493ff57105
-
Size
3.2MB
-
MD5
a385e16864e1ac30f23dd08e87b93319
-
SHA1
987c3448486e401936e928abc52cf80780fb2d37
-
SHA256
832c978576aca4163e3c3127e622316794836b1e634b4128797fc9493ff57105
-
SHA512
e2099df125c1ca9dfbaddd6ec89dadf94fcce7dd8c298958a53a8b0d0e52d91c0b26f8d1746ec72d5527594d678ec19c29f4849994d268fbdb6200a5c13c7699
-
SSDEEP
49152:tgviI22SsaNYfdPBldt698dBcjHq1SQoGv5lpTHHB72eh2NTf:mvv22SsaNYfdPBldt6+dBcjHq19x8
-
Modifies visiblity of hidden/system files in Explorer
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2