General
-
Target
Build.exe
-
Size
8.0MB
-
Sample
250331-qp8dmatjy4
-
MD5
5aeb840fa69ff4dcd8ba0816a2da1434
-
SHA1
e710536efe591bb5cf24e3b4cd270775feffddb6
-
SHA256
1f33f50f29b612c23fe2890fe9567c42e2512ae3c7818f3c60879665019bb4df
-
SHA512
44c277c1fdd72b2e246bb511f4686df823636c41acaf8d2825c4399a216f48b6d037b9c197db6134464a5c54156648e8bf96dff72bda1426f58578de740a9f72
-
SSDEEP
49152:zf+7HoOWA0PMlJmN8UkruiWIKYqAFs6eYfZVmBumJzMmbmMqoBLPg4NOW:zG7HlQ6Jg8RrucFs6e6ZV5mJQmbmNW
Behavioral task
behavioral1
Sample
Build.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
Build.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
Build.exe
Resource
win11-20250313-en
Malware Config
Extracted
quasar
1.5.0
Office04
51.89.204.80:4782
65581c6d-14ba-4da9-86dd-ffd8304b8eb1
-
encryption_key
8C25D2F2D6CDE756BAFC0531B3B70446BFBAF003
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Modded Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
Build.exe
-
Size
8.0MB
-
MD5
5aeb840fa69ff4dcd8ba0816a2da1434
-
SHA1
e710536efe591bb5cf24e3b4cd270775feffddb6
-
SHA256
1f33f50f29b612c23fe2890fe9567c42e2512ae3c7818f3c60879665019bb4df
-
SHA512
44c277c1fdd72b2e246bb511f4686df823636c41acaf8d2825c4399a216f48b6d037b9c197db6134464a5c54156648e8bf96dff72bda1426f58578de740a9f72
-
SSDEEP
49152:zf+7HoOWA0PMlJmN8UkruiWIKYqAFs6eYfZVmBumJzMmbmMqoBLPg4NOW:zG7HlQ6Jg8RrucFs6e6ZV5mJQmbmNW
-
Quasar family
-
Quasar payload
-
StormKitty payload
-
Stormkitty family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2