General
-
Target
124eb5a9a5cc2692be7765cac6afdb191ec0eb8e860f5cd12c311299df10fe17.rar
-
Size
3.6MB
-
Sample
250115-clpkfsxkg1
-
MD5
742c6b3bbb2e13f4b677d7730db606f8
-
SHA1
9290e5994a976bb1418f98415a5d6c419657d924
-
SHA256
124eb5a9a5cc2692be7765cac6afdb191ec0eb8e860f5cd12c311299df10fe17
-
SHA512
335ca990ea5940fc6bbe517e5bdd98190051c0a6d430416deca41ea45498c8d51c2bbc6cab8c7fbdfd53dc6dc433db8da977df7b3f92c1128944506439631e5a
-
SSDEEP
98304:CvNmEAU9XskDezxDV+tWXUfsXmpugsj2pXfU2ZbXzTN:AZAgvDezO0kfsXmpubapXfU2F5
Static task
static1
Behavioral task
behavioral1
Sample
RFQ.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
gasplant
toolsbox.ydns.eu:20901
33714128-68e4-4509-bd32-b7e414783d3eDtWike
-
encryption_key
43CBFE44C367A91A79A79C9E1778A82D0B498870
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
RFQ.exe
-
Size
3.8MB
-
MD5
df29ee043d88f265cd76747f62ab3ea7
-
SHA1
0594a814e05c80618a72a865fa53d24fd351db5b
-
SHA256
1528a6080656c5a8cf440d976047d7fa31e93e483c10142f416108f211145ff0
-
SHA512
7826bc0582819fb165b25c21fd5a9385b47332201a464b8ae4a035d65f0b3c7ece75507ba0acfa92a6e8b55f2a18ba83344dbf3db264be7d43d3beb5796384a1
-
SSDEEP
98304:WhZ14lAzlFFzMsYLtZvQ1pVjLvAMQkWS27MtXE:WhZ1AAvFzMBNQTBIMQkXtX
-
Quasar family
-
Quasar payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-