General
-
Target
03543b1c5bfd9393444c098e18ab1ab2fdd450d8544f8fd4019f2ddb4b764edd
-
Size
1.7MB
-
Sample
221008-1675asgaak
-
MD5
3a9f26f591eea148881df705db331380
-
SHA1
28cf6555dc5df449b8d22fb01180552a1bdc74f9
-
SHA256
03543b1c5bfd9393444c098e18ab1ab2fdd450d8544f8fd4019f2ddb4b764edd
-
SHA512
d3e62d0a83ea378a16f805338e11a79c9d4d9bf25442462a34fb08488ec59ebb119b1618c42837d5db2c7431c48500db309527d8a941378608e341db432873ed
-
SSDEEP
24576:PUxJIRCRoenYQb6VOJ8Kgn1beVuumyEU:
Static task
static1
Behavioral task
behavioral1
Sample
03543b1c5bfd9393444c098e18ab1ab2fdd450d8544f8fd4019f2ddb4b764edd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
03543b1c5bfd9393444c098e18ab1ab2fdd450d8544f8fd4019f2ddb4b764edd.exe
Resource
win10-20220901-en
Malware Config
Extracted
quasar
1.4.0
Cio
162.19.131.197:4782
c5fdf017-8f44-47ea-a69e-0b82e4044ca7
-
encryption_key
59A92039F951E5069C9F50FD9F340E759713B058
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
03543b1c5bfd9393444c098e18ab1ab2fdd450d8544f8fd4019f2ddb4b764edd
-
Size
1.7MB
-
MD5
3a9f26f591eea148881df705db331380
-
SHA1
28cf6555dc5df449b8d22fb01180552a1bdc74f9
-
SHA256
03543b1c5bfd9393444c098e18ab1ab2fdd450d8544f8fd4019f2ddb4b764edd
-
SHA512
d3e62d0a83ea378a16f805338e11a79c9d4d9bf25442462a34fb08488ec59ebb119b1618c42837d5db2c7431c48500db309527d8a941378608e341db432873ed
-
SSDEEP
24576:PUxJIRCRoenYQb6VOJ8Kgn1beVuumyEU:
Score10/10-
Quasar payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-