Analysis
-
max time kernel
137s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 02:34
Behavioral task
behavioral1
Sample
59405ec9b904646f7d674606945cffab2ece5cb7fba153c91de4c79bb40aa553.exe
Resource
win7-20241023-en
General
-
Target
59405ec9b904646f7d674606945cffab2ece5cb7fba153c91de4c79bb40aa553.exe
-
Size
3.1MB
-
MD5
44037f6c2fed815da4c59b50479561f5
-
SHA1
f724de9954505061cd9f4fbe90bd57d8375ef6d1
-
SHA256
59405ec9b904646f7d674606945cffab2ece5cb7fba153c91de4c79bb40aa553
-
SHA512
e33bb327a8b8afc38bba20adfe4d00d99bd3772d65df1125796e5de00d02e37e8ea3a9ce48d16d5374343079d7addf8456c09b053ef9dfec35d183aaddfdf30d
-
SSDEEP
49152:twAlUPhZwv68DkG17WlqTz5oqMn0f8bUlUUU+UUUZAMoAGdQTHHB72eh2NT:twsUPhZwv68DkG17WlqTzeqMn0fcK
Malware Config
Extracted
quasar
1.4.2
Java
45.83.244.141:4782
18dba2e6-0f3a-4d9f-b95d-78cbc696f514
-
encryption_key
88D5D2E6C33089786488A381589CC2587B1B6759
-
install_name
$77-cmd.exe
-
log_directory
$77-Logs
-
reconnect_delay
1000
-
startup_key
$77-cmd
-
subdirectory
$77-SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/812-1-0x0000000000BF0000-0x0000000000F14000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 812 59405ec9b904646f7d674606945cffab2ece5cb7fba153c91de4c79bb40aa553.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 812 59405ec9b904646f7d674606945cffab2ece5cb7fba153c91de4c79bb40aa553.exe