General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
230601-vm9acsfe32
-
MD5
5ddcc9baa65b17926f2262a9fe530b93
-
SHA1
6fa7fd0df2a9928b6c063fc03b10bdcd84e26008
-
SHA256
9ce882116ae23f4d32f4937f2b61ca8deea0c476be41fdd3158dadc14335a45f
-
SHA512
79fd0d0ff6115972017fef2c6feeddaf26db86bb69437ca431abd2ba35d4b6c249c7150f3969fd589006b2d3defa674c589610caee5a1585e50f027b06f6aa06
-
SSDEEP
49152:+vaY52fyaSZOrPWluWBuGG5g5hPbRJ6KbR3LoGd/THHB72eh2NT:+vv52fyaSZOrPWluWBDG5g5hPbRJ6k
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20230220-en
Malware Config
Extracted
quasar
1.4.1
Office04
127.0.0.1:4782
57af6279-a68f-4f70-9b6b-439dccca1ff4
-
encryption_key
1B9C51B90AB1DE21D6A313176E631A6295A0C2E6
-
install_name
Memes.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
memes
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
5ddcc9baa65b17926f2262a9fe530b93
-
SHA1
6fa7fd0df2a9928b6c063fc03b10bdcd84e26008
-
SHA256
9ce882116ae23f4d32f4937f2b61ca8deea0c476be41fdd3158dadc14335a45f
-
SHA512
79fd0d0ff6115972017fef2c6feeddaf26db86bb69437ca431abd2ba35d4b6c249c7150f3969fd589006b2d3defa674c589610caee5a1585e50f027b06f6aa06
-
SSDEEP
49152:+vaY52fyaSZOrPWluWBuGG5g5hPbRJ6KbR3LoGd/THHB72eh2NT:+vv52fyaSZOrPWluWBDG5g5hPbRJ6k
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-