General
-
Target
12d3a5848962353e0799964d9774bbbbf63c8d77a924f3cc14df49039c2ecb73
-
Size
348KB
-
Sample
250109-y6d54szmhz
-
MD5
222eb2520861357489b7a11a99656e3f
-
SHA1
fb21802a64e6bbc3a9746e5ee5e4f92c2dc8bfcf
-
SHA256
12d3a5848962353e0799964d9774bbbbf63c8d77a924f3cc14df49039c2ecb73
-
SHA512
991d90dda45c324e4b15a3cf3d0f5209d2f71c4d3145169215737c448d8ce0da494f32a2187e5bddb4eac488a48e18b061ff7bd42d1a28458e472359af798ecb
-
SSDEEP
6144:+V6bPXhLApfpUw4qCgafQbX30nlIHh/m7vHdjz7iO:umhAp6lqKfq0GheLHd/iO
Behavioral task
behavioral1
Sample
12d3a5848962353e0799964d9774bbbbf63c8d77a924f3cc14df49039c2ecb73.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.3.0.0
ForceOP
jordiek1d.ddns.net:4782
QSR_MUTEX_Y1VQAwHslXRVvQkGHj
-
encryption_key
3xJFlGvSDHRDtYnPg0qe
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
WindowsDrivers
-
subdirectory
SubDir
Targets
-
-
Target
12d3a5848962353e0799964d9774bbbbf63c8d77a924f3cc14df49039c2ecb73
-
Size
348KB
-
MD5
222eb2520861357489b7a11a99656e3f
-
SHA1
fb21802a64e6bbc3a9746e5ee5e4f92c2dc8bfcf
-
SHA256
12d3a5848962353e0799964d9774bbbbf63c8d77a924f3cc14df49039c2ecb73
-
SHA512
991d90dda45c324e4b15a3cf3d0f5209d2f71c4d3145169215737c448d8ce0da494f32a2187e5bddb4eac488a48e18b061ff7bd42d1a28458e472359af798ecb
-
SSDEEP
6144:+V6bPXhLApfpUw4qCgafQbX30nlIHh/m7vHdjz7iO:umhAp6lqKfq0GheLHd/iO
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-