General
-
Target
Packburpsuite22.rar
-
Size
208.8MB
-
Sample
250125-pbkvqssjgw
-
MD5
75d761317f34545da3785bc2d6af1d1a
-
SHA1
1c9e2ad42892e84d76ea37db3527f2461b330f4b
-
SHA256
a22da8d56cf13256c246fe97435059f93a46da71a8bf2eefa3d86383aab03561
-
SHA512
ed7d89923186c32618973546b3c04b53cc91d7704723638c629abe46c8e4cd96db6f2e75b2bcdfea410ffd32d459e5e53b95a4b5bd264638114e56a0827e8a18
-
SSDEEP
6291456:23kzLaunKvHkZY4Sq4X5FVdSzc59BuJhA+EWeBUnp:IkabvHuSq4JndmGBEt
Static task
static1
Behavioral task
behavioral1
Sample
Packburpsuite22.rar
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.3.0.0
loomis2
jubilesystem.ddnsking.com:4444
QSR_MUTEX_ZjSInQJ5D4br5J3Ynw
-
encryption_key
qDIhB2NvMxV9BhEYx5Ic
-
install_name
shostt.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svhostt
-
subdirectory
SubDir
Targets
-
-
Target
Packburpsuite22.rar
-
Size
208.8MB
-
MD5
75d761317f34545da3785bc2d6af1d1a
-
SHA1
1c9e2ad42892e84d76ea37db3527f2461b330f4b
-
SHA256
a22da8d56cf13256c246fe97435059f93a46da71a8bf2eefa3d86383aab03561
-
SHA512
ed7d89923186c32618973546b3c04b53cc91d7704723638c629abe46c8e4cd96db6f2e75b2bcdfea410ffd32d459e5e53b95a4b5bd264638114e56a0827e8a18
-
SSDEEP
6291456:23kzLaunKvHkZY4Sq4X5FVdSzc59BuJhA+EWeBUnp:IkabvHuSq4JndmGBEt
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1