General
-
Target
extracted_payload-cleaned - Copy.exe
-
Size
5.8MB
-
Sample
250204-3w3syazqej
-
MD5
bcff5526d0e5da9524a89b2dcc809cee
-
SHA1
b8c321683058f79eb810e73d338caf292fc04611
-
SHA256
a0161d709793136e815c902d928421ca5447ac394449a35ee529d85aed318251
-
SHA512
a9101d4991c49c229b324e5313a9f92cdb489fa1aab68970cdf8189029ad4f30aa03a97c2441be800eec9995042656bc180d00632e8400f43b0c57c023185a53
-
SSDEEP
98304:dVzA+NolR3oceUQ1spbvuKSUJ17LrbH4q8y1iYVk1OUkh54oZdxkOHYSM:7PNO3K1spbmxcrbH4a1iYVk1O15DUC
Static task
static1
Behavioral task
behavioral1
Sample
extracted_payload-cleaned - Copy.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
extracted_payload-cleaned - Copy.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
quasar
1.4.0
v15.0 | Fifa23
private123.duckdns.org:8808
dofucks.com:8808
c398e98c-136e-4007-ab40-e179829f338c
-
encryption_key
C84CB6134701741C5122A14FACDB67C8CFA9C0AB
-
install_name
.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
$sxr-seroxen
Targets
-
-
Target
extracted_payload-cleaned - Copy.exe
-
Size
5.8MB
-
MD5
bcff5526d0e5da9524a89b2dcc809cee
-
SHA1
b8c321683058f79eb810e73d338caf292fc04611
-
SHA256
a0161d709793136e815c902d928421ca5447ac394449a35ee529d85aed318251
-
SHA512
a9101d4991c49c229b324e5313a9f92cdb489fa1aab68970cdf8189029ad4f30aa03a97c2441be800eec9995042656bc180d00632e8400f43b0c57c023185a53
-
SSDEEP
98304:dVzA+NolR3oceUQ1spbvuKSUJ17LrbH4q8y1iYVk1OUkh54oZdxkOHYSM:7PNO3K1spbmxcrbH4a1iYVk1O15DUC
-
Quasar family
-
Quasar payload
-
Seroxen family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1