General
-
Target
95586fa277668206c164bcc7af2d92602bf6a993b9f7fda951bbd9fd3342e3eb.exe
-
Size
3.6MB
-
Sample
250326-x63yss1xey
-
MD5
69f3bc0083e17e7c28d06140308b12d8
-
SHA1
3d637938626dbb7e63be9da10b83a94997f87f5c
-
SHA256
95586fa277668206c164bcc7af2d92602bf6a993b9f7fda951bbd9fd3342e3eb
-
SHA512
8f5b3ea0d36a6f7b16a25aa69d9ba93ba2e60e01c48124d049177a9e4b8bc104fa1fabe37eb3cc7b1b39339b15388e6ae89b552d8aae23ffad1b225df9d14681
-
SSDEEP
98304:wqiCGJV+6YRVnvrjgZQBB1pKOnTHq3IJYAsUx81J:wXCCYRVnvKOjq4SAsV7
Static task
static1
Behavioral task
behavioral1
Sample
95586fa277668206c164bcc7af2d92602bf6a993b9f7fda951bbd9fd3342e3eb.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
BZ EMY
bz-fnd3.ydns.eu:9841
wqo9.firewall-gateway.de:9792
d9ad6O0279-3e005-4045-b50a-d6b5ff71d693
-
encryption_key
3145298725BA5E0DD56E87FFE3F8898EA81E6EDA
-
install_name
MSworkbooks.exe
-
log_directory
Logs
-
reconnect_delay
6000
-
startup_key
MSworkbook
-
subdirectory
SubDir
Targets
-
-
Target
95586fa277668206c164bcc7af2d92602bf6a993b9f7fda951bbd9fd3342e3eb.exe
-
Size
3.6MB
-
MD5
69f3bc0083e17e7c28d06140308b12d8
-
SHA1
3d637938626dbb7e63be9da10b83a94997f87f5c
-
SHA256
95586fa277668206c164bcc7af2d92602bf6a993b9f7fda951bbd9fd3342e3eb
-
SHA512
8f5b3ea0d36a6f7b16a25aa69d9ba93ba2e60e01c48124d049177a9e4b8bc104fa1fabe37eb3cc7b1b39339b15388e6ae89b552d8aae23ffad1b225df9d14681
-
SSDEEP
98304:wqiCGJV+6YRVnvrjgZQBB1pKOnTHq3IJYAsUx81J:wXCCYRVnvKOjq4SAsV7
-
Quasar family
-
Quasar payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-