General
-
Target
6d6c9c719e2f757442374af378c343a7.exe
-
Size
3.1MB
-
Sample
250101-fkn43sxqfn
-
MD5
6d6c9c719e2f757442374af378c343a7
-
SHA1
a58a2aa6dae2dbdf64472614985cac2adce4eddb
-
SHA256
444c97f6db0626069965d9e4ddb4bf315326954c51b123b3dc7d64084e7fb646
-
SHA512
a3ef795e64b1d43ca300da97abc7d211e5987064c1c7cafa7a1dadcd1cb35902fb230f5b8e9a008ced4bc1d33573403bad2d99a4ccca9b6b749355110eb10210
-
SSDEEP
49152:HwElUPhZwv68DkG17WlqTz5oqM/p7vGJfAHdkTHHB72eh2NT:HwYUPhZwv68DkG17WlqTzeqM/p6t
Behavioral task
behavioral1
Sample
6d6c9c719e2f757442374af378c343a7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6d6c9c719e2f757442374af378c343a7.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.4.2
Office04
193.31.28.181:4004
704ccf6d-01bf-4037-a807-12a60509b1a4
-
encryption_key
379B83B5AFE5908E0BC4583EBB5A83D7B76D2E00
-
install_name
Client.exe
-
log_directory
$77-Logs
-
reconnect_delay
3000
-
startup_key
$77-cmd
-
subdirectory
$77-cmd
Targets
-
-
Target
6d6c9c719e2f757442374af378c343a7.exe
-
Size
3.1MB
-
MD5
6d6c9c719e2f757442374af378c343a7
-
SHA1
a58a2aa6dae2dbdf64472614985cac2adce4eddb
-
SHA256
444c97f6db0626069965d9e4ddb4bf315326954c51b123b3dc7d64084e7fb646
-
SHA512
a3ef795e64b1d43ca300da97abc7d211e5987064c1c7cafa7a1dadcd1cb35902fb230f5b8e9a008ced4bc1d33573403bad2d99a4ccca9b6b749355110eb10210
-
SSDEEP
49152:HwElUPhZwv68DkG17WlqTz5oqM/p7vGJfAHdkTHHB72eh2NT:HwYUPhZwv68DkG17WlqTzeqM/p6t
Score10/10-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-