General
-
Target
3948-166-0x0000000000400000-0x000000000045E000-memory.dmp
-
Size
376KB
-
Sample
230104-bap66sdd95
-
MD5
c3cc7c3cdc7cc4e405287299172f032b
-
SHA1
9f14293496b44e25c0f1bec7ca38b9089bf8a5a5
-
SHA256
b84f5424cb31633b056bde31da523deebfe00b5e7939dd11b44e3f1552798009
-
SHA512
f45a39931d6ce2ed79d12b82dffe8031309eca8cde65872c60a23918e2bcfa1bdda71bd7502f43646297566e4c7ffca44c0748528be46a957d6b6aa85adf4d99
-
SSDEEP
6144:7C2NHXf500M94OI7tfrMnlbTOSZ6fxjyWNmDMGoJOu:Vd50cOI2FpZOjU1oJOu
Behavioral task
behavioral1
Sample
3948-166-0x0000000000400000-0x000000000045E000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3948-166-0x0000000000400000-0x000000000045E000-memory.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
quasar
1.3.0.0
BTC
newqs.ddns.net:6666
QSR_MUTEX_yXXdA121x1YpxYg8uW
-
encryption_key
HFwfuOKEk3Fb6O6wDQ4B
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
3948-166-0x0000000000400000-0x000000000045E000-memory.dmp
-
Size
376KB
-
MD5
c3cc7c3cdc7cc4e405287299172f032b
-
SHA1
9f14293496b44e25c0f1bec7ca38b9089bf8a5a5
-
SHA256
b84f5424cb31633b056bde31da523deebfe00b5e7939dd11b44e3f1552798009
-
SHA512
f45a39931d6ce2ed79d12b82dffe8031309eca8cde65872c60a23918e2bcfa1bdda71bd7502f43646297566e4c7ffca44c0748528be46a957d6b6aa85adf4d99
-
SSDEEP
6144:7C2NHXf500M94OI7tfrMnlbTOSZ6fxjyWNmDMGoJOu:Vd50cOI2FpZOjU1oJOu
Score1/10 -