General
-
Target
iamsupersmart.exe
-
Size
3.1MB
-
Sample
250122-wxnl3szkdl
-
MD5
dda3d825becc420ec452daaff079f6b4
-
SHA1
903ab84afdb605cb965f087d10c2ec84f6facbc3
-
SHA256
0492d6d567045871e1ee3c888f02e38848020a07a261615a931782419bd3cbe3
-
SHA512
4ab3cc498ae01aa2ecf1b351746a7bb35cbae4975a1f24805a070c6421415972c0b443fb92f5f6e61d7362921c86e37e2983fd77f62d61ec229c941cd3d4209e
-
SSDEEP
49152:Nv+lL26AaNeWgPhlmVqvMQ7XSK5qOH9oGdRjvTHHB72eh2NT:NvuL26AaNeWgPhlmVqkQ7XSKkOd
Behavioral task
behavioral1
Sample
iamsupersmart.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
Office04
meming-28826.portmap.host:28826
6396d47d-b301-4dbd-a1c2-f92271440b4b
-
encryption_key
B323B6B4414256836290414EF6F85AFA580A2B68
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System Notification Tray
-
subdirectory
SubDir
Targets
-
-
Target
iamsupersmart.exe
-
Size
3.1MB
-
MD5
dda3d825becc420ec452daaff079f6b4
-
SHA1
903ab84afdb605cb965f087d10c2ec84f6facbc3
-
SHA256
0492d6d567045871e1ee3c888f02e38848020a07a261615a931782419bd3cbe3
-
SHA512
4ab3cc498ae01aa2ecf1b351746a7bb35cbae4975a1f24805a070c6421415972c0b443fb92f5f6e61d7362921c86e37e2983fd77f62d61ec229c941cd3d4209e
-
SSDEEP
49152:Nv+lL26AaNeWgPhlmVqvMQ7XSK5qOH9oGdRjvTHHB72eh2NT:NvuL26AaNeWgPhlmVqkQ7XSKkOd
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-