General
-
Target
11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2
-
Size
4.6MB
-
Sample
250419-mv1zystvgv
-
MD5
3ed992586de3ed67aad864fe62734937
-
SHA1
bcf4c8a3cbc671ba7fc6ac38b1581806913883dd
-
SHA256
11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2
-
SHA512
42668112eacf827325c88af0c6ec59c16b918f6f9772ef84e15a5ad8f0b5b6dd9643fe6d2467216c1374725b9c6cb742017ec7cebb6fb2763189d1d697f6ac37
-
SSDEEP
98304:/gYSDiz3Clzp6QcwQhgBe8MFLgg5A4gmRGo1q0ZT:oHDcSNcwQhgBimwtH
Behavioral task
behavioral1
Sample
11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
quasar
1.4.1
Office05
192.168.0.101:2025
3f648fc9-2a82-4ca1-8687-e39e14478579
-
encryption_key
F3E6B52CEF8F81BA550B56134E7C52D02C97B9AA
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2
-
Size
4.6MB
-
MD5
3ed992586de3ed67aad864fe62734937
-
SHA1
bcf4c8a3cbc671ba7fc6ac38b1581806913883dd
-
SHA256
11c1119ca27a3d70ef72d69c3f1af1ae9540d4b5d2b48d9b3caa554ba6f54cd2
-
SHA512
42668112eacf827325c88af0c6ec59c16b918f6f9772ef84e15a5ad8f0b5b6dd9643fe6d2467216c1374725b9c6cb742017ec7cebb6fb2763189d1d697f6ac37
-
SSDEEP
98304:/gYSDiz3Clzp6QcwQhgBe8MFLgg5A4gmRGo1q0ZT:oHDcSNcwQhgBimwtH
-
Quasar family
-
Quasar payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks whether UAC is enabled
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-