General
-
Target
stub.exe
-
Size
348KB
-
Sample
230514-xp1gcadc86
-
MD5
46b23e41aeba2bb731b8ae3e22a7e5dc
-
SHA1
a180b34c6f9cc519d1d3773904c56c3d952ca423
-
SHA256
c8277e88b37878917b46d509324a57846d58e285c3e06720a282e7bb34fd9bc0
-
SHA512
9387f05ce259a39be1a194fbb4a89747d4005866bfddfec2a5605437b899563f7bc5c4af2231f8bc76934ecbabc15ea1596c0c5d70a4207390be13cc6d95d176
-
SSDEEP
6144:+2NHXf500MGQqCgPsccwxdbNNepgFVswka:1d50yzVteGjswka
Behavioral task
behavioral1
Sample
stub.exe
Resource
win7-20230220-en
Malware Config
Extracted
quasar
1.3.0.0
new2
asyfguas.con-ip.com:555
QSR_MUTEX_ehHHLz4QY25Plj0Xry
-
encryption_key
SF8iuyfrBbCOUe75IKlr
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
stub.exe
-
Size
348KB
-
MD5
46b23e41aeba2bb731b8ae3e22a7e5dc
-
SHA1
a180b34c6f9cc519d1d3773904c56c3d952ca423
-
SHA256
c8277e88b37878917b46d509324a57846d58e285c3e06720a282e7bb34fd9bc0
-
SHA512
9387f05ce259a39be1a194fbb4a89747d4005866bfddfec2a5605437b899563f7bc5c4af2231f8bc76934ecbabc15ea1596c0c5d70a4207390be13cc6d95d176
-
SSDEEP
6144:+2NHXf500MGQqCgPsccwxdbNNepgFVswka:1d50yzVteGjswka
-
Quasar payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-