General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
230807-m6ynzaeh89
-
MD5
5c1a32689b011a239f97ed3bd910cecf
-
SHA1
a6b75db86fe60710263a9ea0f475a1f6e4c9ba9c
-
SHA256
08d8a25cd656729189ca892bedf7938bed5d77d1b87df0f148d8a1e2bfd97b8e
-
SHA512
71dbc1510e4de76cdd0e04d211f081e5163d35f3e10ab30f9e2aadd1bd0526b9d04d4e016687847c5825b68aa3406fa0e490bdfb19a6fb43372f2073ac1ce287
-
SSDEEP
49152:rvbI22SsaNYfdPBldt698dBcjH5g1wMBx04oGdwwTHHB72eh2NT:rvk22SsaNYfdPBldt6+dBcjHswYg
Malware Config
Extracted
quasar
1.4.1
Office04
2.tcp.ngrok.io:19647
eff7fb15-f1b6-49a7-a5e8-41f76e365ecc
-
encryption_key
1B550D191B71501C5CFCFD4E2C6AD3AB301AD330
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
5c1a32689b011a239f97ed3bd910cecf
-
SHA1
a6b75db86fe60710263a9ea0f475a1f6e4c9ba9c
-
SHA256
08d8a25cd656729189ca892bedf7938bed5d77d1b87df0f148d8a1e2bfd97b8e
-
SHA512
71dbc1510e4de76cdd0e04d211f081e5163d35f3e10ab30f9e2aadd1bd0526b9d04d4e016687847c5825b68aa3406fa0e490bdfb19a6fb43372f2073ac1ce287
-
SSDEEP
49152:rvbI22SsaNYfdPBldt698dBcjH5g1wMBx04oGdwwTHHB72eh2NT:rvk22SsaNYfdPBldt6+dBcjHswYg
-
Quasar payload
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-