Resubmissions
09-02-2025 13:39
250209-qx2k2ssqdw 809-02-2025 13:24
250209-qndgvsslbn 609-02-2025 12:28
250209-pnkqha1kcy 809-02-2025 12:23
250209-pkvraszpgm 809-02-2025 11:59
250209-n5tjaszlfr 809-02-2025 11:40
250209-ns8sfsyqbq 309-02-2025 11:29
250209-nls4esyqgs 809-02-2025 10:33
250209-mlys8svjcx 3General
-
Target
test.txt
-
Size
18B
-
Sample
250201-pe9m9s1pdz
-
MD5
5b3f97d48c8751bd031b7ea53545bdb6
-
SHA1
88be3374c62f23406ec83bb11279f8423bd3f88d
-
SHA256
d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b
-
SHA512
ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6
Static task
static1
Malware Config
Extracted
quasar
1.4.1
Office04
10.127.0.90:4782
caaddb2c-fe97-4b73-8a25-f74523b47c7b
-
encryption_key
78F2A808902EFAA2FADFDAA87F9E3B046FF44F58
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
test.txt
-
Size
18B
-
MD5
5b3f97d48c8751bd031b7ea53545bdb6
-
SHA1
88be3374c62f23406ec83bb11279f8423bd3f88d
-
SHA256
d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b
-
SHA512
ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1