General
-
Target
a722d5c6160420869e7db22ee1bd07f83aa9078f6099370a8b07456e22da4b98N.exe
-
Size
3.1MB
-
Sample
250120-1vjbss1ndp
-
MD5
ed8587b8361fe7ababea56910e3a7750
-
SHA1
9c4cf2e76a09b8bed78ae240e6c35deaa4b3f5d7
-
SHA256
a722d5c6160420869e7db22ee1bd07f83aa9078f6099370a8b07456e22da4b98
-
SHA512
18248abf111d37412df931eece3b28d9314358fb21282c791d7dc45f97fa1a8de7ac5728c8f2687a0a4d648f6fcffcecf54c4e7d6f6c61a3bee017b01f52b6b3
-
SSDEEP
49152:mvDI22SsaNYfdPBldt698dBcjHM/RJ6bbR3LoGdOTHHB72eh2NT:mv822SsaNYfdPBldt6+dBcjHM/RJ6t
Behavioral task
behavioral1
Sample
a722d5c6160420869e7db22ee1bd07f83aa9078f6099370a8b07456e22da4b98N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a722d5c6160420869e7db22ee1bd07f83aa9078f6099370a8b07456e22da4b98N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.4.1
SvchostMan
121.89.184.234:4782
106.241.55.218:4782
3094dfa3-6b09-4170-abb5-cd6f0b055018
-
encryption_key
A5C933A97D91C5A7CDBF6D4FF8D161BFBC686474
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Svc Name
-
subdirectory
drivers
Targets
-
-
Target
a722d5c6160420869e7db22ee1bd07f83aa9078f6099370a8b07456e22da4b98N.exe
-
Size
3.1MB
-
MD5
ed8587b8361fe7ababea56910e3a7750
-
SHA1
9c4cf2e76a09b8bed78ae240e6c35deaa4b3f5d7
-
SHA256
a722d5c6160420869e7db22ee1bd07f83aa9078f6099370a8b07456e22da4b98
-
SHA512
18248abf111d37412df931eece3b28d9314358fb21282c791d7dc45f97fa1a8de7ac5728c8f2687a0a4d648f6fcffcecf54c4e7d6f6c61a3bee017b01f52b6b3
-
SSDEEP
49152:mvDI22SsaNYfdPBldt698dBcjHM/RJ6bbR3LoGdOTHHB72eh2NT:mv822SsaNYfdPBldt6+dBcjHM/RJ6t
Score10/10-
Quasar family
-
Quasar payload
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Drops file in System32 directory
-