General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
250111-2e9dqavmfk
-
MD5
2ec8bb66e6d31a3eed3ab81af9c86633
-
SHA1
51775afa0bda90e7fb956897a0649302a6e3e862
-
SHA256
8c693ee26028976b6f9377f1a95e27cb821120e2ab6b5ffb885782f66eb59699
-
SHA512
a9b2fab76f360e7cdde888b205d823c062e9d883dfe97a066590a00e43ab2d6e8853223ff44e572bc221da03bd8f9bf2c419851783322172618f56a6e52c6d0a
-
SSDEEP
49152:rvTlL26AaNeWgPhlmVqvMQ7XSKsZxNESEZk/i6LoGdwETHHB72eh2NT:rvJL26AaNeWgPhlmVqkQ7XSK+xMkg
Malware Config
Extracted
quasar
1.4.1
Office04
aurelosking-49560.portmap.host:49560
9064a2b3-19b5-40a3-82ef-c2a129c8a662
-
encryption_key
151D6A9E126EFB6E3B926F9127D87D6BF4A4C605
-
install_name
fontdrvhost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SecurityHealthSystray.exe
-
subdirectory
NVlDlA
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
2ec8bb66e6d31a3eed3ab81af9c86633
-
SHA1
51775afa0bda90e7fb956897a0649302a6e3e862
-
SHA256
8c693ee26028976b6f9377f1a95e27cb821120e2ab6b5ffb885782f66eb59699
-
SHA512
a9b2fab76f360e7cdde888b205d823c062e9d883dfe97a066590a00e43ab2d6e8853223ff44e572bc221da03bd8f9bf2c419851783322172618f56a6e52c6d0a
-
SSDEEP
49152:rvTlL26AaNeWgPhlmVqvMQ7XSKsZxNESEZk/i6LoGdwETHHB72eh2NT:rvJL26AaNeWgPhlmVqkQ7XSK+xMkg
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1