General
-
Target
lol.zip
-
Size
4.2MB
-
Sample
250111-rt2bjs1nct
-
MD5
f8985e4a9a1362b5066a1b3f960af56a
-
SHA1
02750de32ec09a9fa0a626f19b5c3e54bda0e011
-
SHA256
c23c705943e416e750d0df38fb89f40188f0172eed163ec0d1458a993744f415
-
SHA512
ff8e01242022a74a0ae71991db5df69b8a773a13029175447c087ea4e65869582b3f5db5739eea4247c0452483ceb9b655dd66ec7b537a1df4a2811d6210cf77
-
SSDEEP
98304:dymoFJfIEzT2e3UYldg8cBisa3jtUlE0rQ:dgtXt3TdU5E0E
Static task
static1
Behavioral task
behavioral1
Sample
lol.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
NMW
nm111-20223.portmap.host:20223
0cf74134-5c38-42d6-bb49-4c83c1e37344
-
encryption_key
F7F619EE7207F0CE79B19EAEA54D81315C5AE97B
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Exm Tweaks
-
subdirectory
SubDir
Targets
-
-
Target
lol.exe
-
Size
4.9MB
-
MD5
1958ebce3ce234f5bc991d75bbeac04d
-
SHA1
a3a65a551398e3c81ecb8f4729ea4f879e018ea4
-
SHA256
8961760a99a872da1ba6555b2eafaa8e68dfce94136156fff0651ac61275acf5
-
SHA512
c99210237ac3135c9f75eeafe4803b129d0f7749c3960a8d127e4c28f982c8ecf61672bcf358a5f76cc02bd5cc27ca9863ed9d24ca75242db9799aa84675ac9c
-
SSDEEP
49152:DAodtaG9kS2U84B+FLan9k5TRM9zlfVjjotfsdS2Mc1xZ9mw53PvOL7CaI4LOOEl:h/B179A2Pbn2shvit4xAhQRxGck6lh
-
Quasar family
-
Quasar payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-