General
-
Target
startup_str_232.bat
-
Size
1.8MB
-
Sample
250211-nhhhhswrhw
-
MD5
d7c48a5173ca5bc25644c9799109c835
-
SHA1
8845470e96cf21d7ff11961d3dd370787960dc22
-
SHA256
39b6ba1d146867517cb7772b4a9665bf9139319dcb9e01ebb584ddab9daf54a8
-
SHA512
e6a9e4d84ae1609ce511ba346faac33023e5ed3217a5c082be69ef18378ae3498153659aeeb506d2100c696cb50d329e6c2c24d4233c2b1f9442a5c59293a939
-
SSDEEP
24576:va3qjALWb5fJ3LTbHrDt9uwqPffkE8s706cW4DNTfWihRFxwVyU6fmD7+P+XbCBe:y6ALi5fdLT1qPHlovRciV+VLkrWy4hx
Static task
static1
Behavioral task
behavioral1
Sample
startup_str_232.bat
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
startup_str_232.bat
Resource
win10v2004-20250207-en
Malware Config
Extracted
quasar
1.0.0
Office04
127.0.0.1:4782
504956fd-d532-425c-9e82-cbe7902cf377
-
encryption_key
B8B9B325A830EF659FA4EC42DB8AA956BB46428A
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
startup_str_232.bat
-
Size
1.8MB
-
MD5
d7c48a5173ca5bc25644c9799109c835
-
SHA1
8845470e96cf21d7ff11961d3dd370787960dc22
-
SHA256
39b6ba1d146867517cb7772b4a9665bf9139319dcb9e01ebb584ddab9daf54a8
-
SHA512
e6a9e4d84ae1609ce511ba346faac33023e5ed3217a5c082be69ef18378ae3498153659aeeb506d2100c696cb50d329e6c2c24d4233c2b1f9442a5c59293a939
-
SSDEEP
24576:va3qjALWb5fJ3LTbHrDt9uwqPffkE8s706cW4DNTfWihRFxwVyU6fmD7+P+XbCBe:y6ALi5fdLT1qPHlovRciV+VLkrWy4hx
-
Quasar family
-
Quasar payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1