General
-
Target
c28e37ce98cb20850ba164913c668995822e38c35c491d5ca0e5ec206148b578N.exe
-
Size
3.2MB
-
Sample
250103-zvq6zawlbr
-
MD5
77d75d34a217ca48d26b72d6bf8dedb0
-
SHA1
9a623c8553fec5ccceb7b0de3d1b828da3a49ac2
-
SHA256
c28e37ce98cb20850ba164913c668995822e38c35c491d5ca0e5ec206148b578
-
SHA512
0334623cf7192350bfb8f15a02b273d9cc8e9504f8a04aab0db29e4bfa25e1cc36f35fa2017da73a331caad6aaa893b4b99c9e891071f3b43959f4ad000f53bc
-
SSDEEP
98304:j3Gv5mmQ4yVPgp5qG8AbuF+taoPKN494tP+DLA1s2x:j3Gv5mmQ4yVPgp5qG8AbuF+ta+KN4yt9
Static task
static1
Behavioral task
behavioral1
Sample
c28e37ce98cb20850ba164913c668995822e38c35c491d5ca0e5ec206148b578N.exe
Resource
win7-20241023-en
Malware Config
Extracted
quasar
1.4.0
4Drun
185.148.3.216:4000
c3557859-56ac-475e-b44d-e1b60c20d0d0
-
encryption_key
B000736BEBDF08FC1B6696200651882CF57E43E7
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
3dfx Startup
-
subdirectory
SubDir
Targets
-
-
Target
c28e37ce98cb20850ba164913c668995822e38c35c491d5ca0e5ec206148b578N.exe
-
Size
3.2MB
-
MD5
77d75d34a217ca48d26b72d6bf8dedb0
-
SHA1
9a623c8553fec5ccceb7b0de3d1b828da3a49ac2
-
SHA256
c28e37ce98cb20850ba164913c668995822e38c35c491d5ca0e5ec206148b578
-
SHA512
0334623cf7192350bfb8f15a02b273d9cc8e9504f8a04aab0db29e4bfa25e1cc36f35fa2017da73a331caad6aaa893b4b99c9e891071f3b43959f4ad000f53bc
-
SSDEEP
98304:j3Gv5mmQ4yVPgp5qG8AbuF+taoPKN494tP+DLA1s2x:j3Gv5mmQ4yVPgp5qG8AbuF+ta+KN4yt9
-
Quasar family
-
Quasar payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1