General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
230803-tl51waeb94
-
MD5
5c0dcf7166a4f2df85a42940f2fe249a
-
SHA1
e0cdb7935aa4236eeeddcb2c0ffdc01f7d3ae0f3
-
SHA256
c42553ebd2f1e93c7bb519eef352d11779c696413d8879f1911c34061afe2c98
-
SHA512
c23153e53f0aeb88ab69ade579e86866b34d382363ed987cb74296bb53a2a2d3f68df9aec754dacc0bf5f51065cc9934bf7480f865bf792da914cec7100f82d7
-
SSDEEP
49152:HvBuf2NUaNmwzPWlvdaKM7ZxTwDZRJ67bR3LoGd/k+THHB72eh2NT:Hvcf2NUaNmwzPWlvdaB7ZxTwDZRJ6N8
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20230712-en
Malware Config
Extracted
quasar
1.4.1
Infected
192.168.1.1:4782
192.168.1.66:4782
dark-crystal.at.ply.gg:4782
ff410ede-beff-4970-8e12-7d251057f1fd
-
encryption_key
1B172706DED462B59F2A5056AB06A8DD1EE8491B
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Realtek Audio
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
5c0dcf7166a4f2df85a42940f2fe249a
-
SHA1
e0cdb7935aa4236eeeddcb2c0ffdc01f7d3ae0f3
-
SHA256
c42553ebd2f1e93c7bb519eef352d11779c696413d8879f1911c34061afe2c98
-
SHA512
c23153e53f0aeb88ab69ade579e86866b34d382363ed987cb74296bb53a2a2d3f68df9aec754dacc0bf5f51065cc9934bf7480f865bf792da914cec7100f82d7
-
SSDEEP
49152:HvBuf2NUaNmwzPWlvdaKM7ZxTwDZRJ67bR3LoGd/k+THHB72eh2NT:Hvcf2NUaNmwzPWlvdaB7ZxTwDZRJ6N8
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-