General
-
Target
MSFS 2024 UPDATER.exe
-
Size
3.1MB
-
Sample
250212-xwq69atqdr
-
MD5
5061f9f48893af28f93d03dcfb71da43
-
SHA1
df81a197c29598332480a0e3fb32b69d31ee985e
-
SHA256
24361c88cec81a0e499d9c5b3acb69e6d9287515a12633b0a0034d2b67bf2d07
-
SHA512
3734e4acf53f921578eeb27cb0c2b2fb689812116e5e187e8afb1f83563da5e11ebbfce025f43ec7b6abac46fa8d6eabaf0cbcbb29701672e331576876ef5ab4
-
SSDEEP
49152:rvXlL26AaNeWgPhlmVqvMQ7XSK9xOEMkIk/JxroGdPxTHHB72eh2NT:rvVL26AaNeWgPhlmVqkQ7XSK9xn5
Behavioral task
behavioral1
Sample
MSFS 2024 UPDATER.exe
Resource
win11-20250210-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.37:4782
49b0d307-a06e-42f0-b4dd-ceae2c88d2f0
-
encryption_key
B73F224CF41A826EF2EC1843B90021541FBE12A9
-
install_name
MSFS_2024_UPDATER.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
MSFS_2024_UPDATER
-
subdirectory
SubDir
Targets
-
-
Target
MSFS 2024 UPDATER.exe
-
Size
3.1MB
-
MD5
5061f9f48893af28f93d03dcfb71da43
-
SHA1
df81a197c29598332480a0e3fb32b69d31ee985e
-
SHA256
24361c88cec81a0e499d9c5b3acb69e6d9287515a12633b0a0034d2b67bf2d07
-
SHA512
3734e4acf53f921578eeb27cb0c2b2fb689812116e5e187e8afb1f83563da5e11ebbfce025f43ec7b6abac46fa8d6eabaf0cbcbb29701672e331576876ef5ab4
-
SSDEEP
49152:rvXlL26AaNeWgPhlmVqvMQ7XSK9xOEMkIk/JxroGdPxTHHB72eh2NT:rvVL26AaNeWgPhlmVqkQ7XSK9xn5
-
Quasar family
-
Quasar payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1