Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 21:51
Behavioral task
behavioral1
Sample
44037f6c2fed815da4c59b50479561f5.exe
Resource
win7-20241010-en
5 signatures
150 seconds
General
-
Target
44037f6c2fed815da4c59b50479561f5.exe
-
Size
3.1MB
-
MD5
44037f6c2fed815da4c59b50479561f5
-
SHA1
f724de9954505061cd9f4fbe90bd57d8375ef6d1
-
SHA256
59405ec9b904646f7d674606945cffab2ece5cb7fba153c91de4c79bb40aa553
-
SHA512
e33bb327a8b8afc38bba20adfe4d00d99bd3772d65df1125796e5de00d02e37e8ea3a9ce48d16d5374343079d7addf8456c09b053ef9dfec35d183aaddfdf30d
-
SSDEEP
49152:twAlUPhZwv68DkG17WlqTz5oqMn0f8bUlUUU+UUUZAMoAGdQTHHB72eh2NT:twsUPhZwv68DkG17WlqTzeqMn0fcK
Malware Config
Extracted
Family
quasar
Version
1.4.2
Botnet
Java
C2
45.83.244.141:4782
Mutex
18dba2e6-0f3a-4d9f-b95d-78cbc696f514
Attributes
-
encryption_key
88D5D2E6C33089786488A381589CC2587B1B6759
-
install_name
$77-cmd.exe
-
log_directory
$77-Logs
-
reconnect_delay
1000
-
startup_key
$77-cmd
-
subdirectory
$77-SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/2548-1-0x00000000000C0000-0x00000000003E4000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2548 44037f6c2fed815da4c59b50479561f5.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2548 44037f6c2fed815da4c59b50479561f5.exe