General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
230803-vhfggsef77
-
MD5
97ca31cf187986d32927e44a55b9492f
-
SHA1
a88a775bff0eb5fb33883eb1ecfbf41ed18a248e
-
SHA256
e0b8bdf7e79e5c4e2f9282b430bd4779f27609cef1996e2c633bfacb4ef16463
-
SHA512
850ca8e9ffda13dc1e1c8a8c0fe96310da974051342717de2358b7917e3939a8eadf1170d4d6d16f02afe815d41fda2061652c5a69e84e32962c2acc53f917c5
-
SSDEEP
49152:Evfgo2QSaNpzyPllgamb0CZof/JOkJrAMfNLoGdnTHHB72eh2NT:EvIo2QSaNpzyPllgamYCZof/JOkJrJ
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20230712-en
Malware Config
Extracted
quasar
1.4.1
Infected
192.168.1.1:4782
192.168.1.66:4782
dark-crystal.at.ply.gg:4782
AmirAmir8565-21667.portmap.host:4782
AmirAmir8565-20409.portmap.host:20409
ff410ede-beff-4970-8e12-7d251057f1fd
-
encryption_key
1B172706DED462B59F2A5056AB06A8DD1EE8491B
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Realtek Audio
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
97ca31cf187986d32927e44a55b9492f
-
SHA1
a88a775bff0eb5fb33883eb1ecfbf41ed18a248e
-
SHA256
e0b8bdf7e79e5c4e2f9282b430bd4779f27609cef1996e2c633bfacb4ef16463
-
SHA512
850ca8e9ffda13dc1e1c8a8c0fe96310da974051342717de2358b7917e3939a8eadf1170d4d6d16f02afe815d41fda2061652c5a69e84e32962c2acc53f917c5
-
SSDEEP
49152:Evfgo2QSaNpzyPllgamb0CZof/JOkJrAMfNLoGdnTHHB72eh2NT:EvIo2QSaNpzyPllgamYCZof/JOkJrJ
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-