General
-
Target
t.cmd
-
Size
1KB
-
Sample
250102-k7ddbaxqcn
-
MD5
c3a80dbc5b98aac01cc124b59ec52d7e
-
SHA1
eae4d2a89be841042839e8bfeca7480a2ba327e4
-
SHA256
4d5a2a643cdab50f0105e110a8187cd812a7ebbc7d903b8a8029cd3508094f32
-
SHA512
addf559ed04d9cbaccdc25d87940c0c0af41e183087c9c956bab438b7cf755a7481aa88d534792c265ace9491302ae81343de77d4c93101a232d44d47500d5a9
Static task
static1
Behavioral task
behavioral1
Sample
t.cmd
Resource
win7-20240729-en
Malware Config
Extracted
https://i.imghippo.com/files/Zf9637kKg.jpg
Extracted
https://i.imghippo.com/files/tBJo2822HAE.jpg
Extracted
quasar
1.4.1
new
194.26.192.167:2768
67b58d78-e769-403e-bf6e-e83f8f31b2f5
-
encryption_key
BE2B0B270E4DB19CAA5C42E9D2EBF64645A2D055
-
install_name
OneDrive.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
OneDrive
-
subdirectory
OneDrive
Targets
-
-
Target
t.cmd
-
Size
1KB
-
MD5
c3a80dbc5b98aac01cc124b59ec52d7e
-
SHA1
eae4d2a89be841042839e8bfeca7480a2ba327e4
-
SHA256
4d5a2a643cdab50f0105e110a8187cd812a7ebbc7d903b8a8029cd3508094f32
-
SHA512
addf559ed04d9cbaccdc25d87940c0c0af41e183087c9c956bab438b7cf755a7481aa88d534792c265ace9491302ae81343de77d4c93101a232d44d47500d5a9
-
Quasar family
-
Quasar payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-