General
-
Target
FrozenLoader.exe
-
Size
348KB
-
Sample
240627-ehhc3stfqm
-
MD5
56df78c075bbdd3b936d20271cd5dd82
-
SHA1
3da3858b7567d1c553d5c0159fcb77bdd066a1eb
-
SHA256
afe6294896126bff591fd4ff3dee78474d3d5c1eb3ffb1e19feded5790274024
-
SHA512
e18fd89bfb797ba68fa8f9a74d152693ac2e8b7f2e8fbac564aa8ea6a8562176036eec6cd0ebf599821c6e047a9e28c105e45e7d3d65527c534d24334c1e4c6e
-
SSDEEP
6144:QG13U1vhtvTA19YhA/bDI3RdG2XC5pH1:LUJtLAvSA4y2XC5pH1
Behavioral task
behavioral1
Sample
FrozenLoader.exe
Resource
win7-20240508-en
Malware Config
Extracted
quasar
3.0.1
Office04
127.0.0.1:2912
QSR_MUTEX_kZpgHXcbTqoAXhJbxd
-
encryption_key
BRjfOpzb3dVWPO5EbkGe
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
FrozenLoader.exe
-
Size
348KB
-
MD5
56df78c075bbdd3b936d20271cd5dd82
-
SHA1
3da3858b7567d1c553d5c0159fcb77bdd066a1eb
-
SHA256
afe6294896126bff591fd4ff3dee78474d3d5c1eb3ffb1e19feded5790274024
-
SHA512
e18fd89bfb797ba68fa8f9a74d152693ac2e8b7f2e8fbac564aa8ea6a8562176036eec6cd0ebf599821c6e047a9e28c105e45e7d3d65527c534d24334c1e4c6e
-
SSDEEP
6144:QG13U1vhtvTA19YhA/bDI3RdG2XC5pH1:LUJtLAvSA4y2XC5pH1
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-