General
-
Target
svchost.exe
-
Size
3.1MB
-
Sample
250208-mymlqssjbq
-
MD5
e37749aa169a0e99033fcbb2a115690b
-
SHA1
ec10e98852491d8312c7d575755b4ddb63799170
-
SHA256
16146c8f8509d561fd958e0e449806e201c9b162038b39544d8ceefa4a17d460
-
SHA512
f7301d801a8559bf75365d19ee83112ebedbbd6c17e45e4ef6c67a5b5636945bb4d28b6c3340549dc8a113c7aadb82ac809dc27c07eb72f864871986bef240ec
-
SSDEEP
49152:fv+lL26AaNeWgPhlmVqvMQ7XSK2lRJ6cbR3LoGdoTHHB72eh2NT:fvuL26AaNeWgPhlmVqkQ7XSK2lRJ6m
Malware Config
Extracted
quasar
1.4.1
svchost
192.168.150.128:443
8c51cc91-2010-4f25-b0cb-831824902ce5
-
encryption_key
AD57652772C12EC255BB6DF4385E6327DCCF50D6
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Realtek HD Audio Universal Service
-
subdirectory
SubDir
Targets
-
-
Target
svchost.exe
-
Size
3.1MB
-
MD5
e37749aa169a0e99033fcbb2a115690b
-
SHA1
ec10e98852491d8312c7d575755b4ddb63799170
-
SHA256
16146c8f8509d561fd958e0e449806e201c9b162038b39544d8ceefa4a17d460
-
SHA512
f7301d801a8559bf75365d19ee83112ebedbbd6c17e45e4ef6c67a5b5636945bb4d28b6c3340549dc8a113c7aadb82ac809dc27c07eb72f864871986bef240ec
-
SSDEEP
49152:fv+lL26AaNeWgPhlmVqvMQ7XSK2lRJ6cbR3LoGdoTHHB72eh2NT:fvuL26AaNeWgPhlmVqkQ7XSK2lRJ6m
-
Quasar family
-
Quasar payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops file in System32 directory
-