General
-
Target
211cd98e00387b71c9a8c75649ce6c3ec1c595964abede78960d5d9f233b06bc
-
Size
431KB
-
Sample
250222-zgtd6szqw6
-
MD5
cb593528c628b13296746bfd449ab801
-
SHA1
a7de38df3678915f2df0f741dea35a55434c4a26
-
SHA256
211cd98e00387b71c9a8c75649ce6c3ec1c595964abede78960d5d9f233b06bc
-
SHA512
8f584d9ddf9cf0aeb3cf668f0b82416ce09f73f1fa41711fcdac2c9ad7e79f0661983f7e92c61b06bbb0fd1330ececa065278b4735853d0b323aba663b3497fa
-
SSDEEP
6144:BI6bPXhLApfpKcjF36bbGXUM1dz0i205u4S26uI:WmhApnFKKt0i205Yz
Behavioral task
behavioral1
Sample
211cd98e00387b71c9a8c75649ce6c3ec1c595964abede78960d5d9f233b06bc.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.3.0.0
Test
10.0.2.2:4782:4782
QSR_MUTEX_uLG4ZRVYEfBangYb5F
-
encryption_key
mcNXfsvLp0Hjh0KA2uyx
-
install_name
Javaupdater.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java Updater
-
subdirectory
JavaUpdater
Targets
-
-
Target
211cd98e00387b71c9a8c75649ce6c3ec1c595964abede78960d5d9f233b06bc
-
Size
431KB
-
MD5
cb593528c628b13296746bfd449ab801
-
SHA1
a7de38df3678915f2df0f741dea35a55434c4a26
-
SHA256
211cd98e00387b71c9a8c75649ce6c3ec1c595964abede78960d5d9f233b06bc
-
SHA512
8f584d9ddf9cf0aeb3cf668f0b82416ce09f73f1fa41711fcdac2c9ad7e79f0661983f7e92c61b06bbb0fd1330ececa065278b4735853d0b323aba663b3497fa
-
SSDEEP
6144:BI6bPXhLApfpKcjF36bbGXUM1dz0i205u4S26uI:WmhApnFKKt0i205Yz
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1