Analysis
-
max time kernel
884s -
max time network
900s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250128-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
06-02-2025 18:12
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10ltsc2021-20250128-en
windows10-ltsc 2021-x64
5 signatures
900 seconds
General
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
de7909c583d5e0b334e89e95f6384171
-
SHA1
d483c5298602a9b706d848262929e4ef3ec03720
-
SHA256
bbdb9c68f5f4dad1f0bc699176d54fca52f89f6a30f4e22b0a7be85b2aade5c1
-
SHA512
a375179aa3f2b4cbf3543c61ccf6ef422c3664a0797cc6d76d044ecced36f23a1bab7927e24bb54394631c1971d3e745085fdc3152b5d25d8bfe8eaddf7f1ee0
-
SSDEEP
49152:rvnI22SsaNYfdPBldt698dBcjH+g/MBxvLoGd5THHB72eh2NT:rvI22SsaNYfdPBldt6+dBcjH1/s
Malware Config
Extracted
Family
quasar
Version
1.4.1
Botnet
Office04
C2
100.68.87.21:5050
Mutex
7f5242b1-93d2-4a21-9129-5a75556ad700
Attributes
-
encryption_key
797D0B478D9E5462152708E8188B9B9CACB9144A
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/4008-1-0x0000000000070000-0x0000000000394000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4008 Client-built.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4008 Client-built.exe