General
-
Target
2.exe
-
Size
3.1MB
-
Sample
231127-lprcwsfg32
-
MD5
b4383485e556da9e96ccddde2575a37f
-
SHA1
607a3903bb4c5b10bb542fdced5aed35967602e7
-
SHA256
c36d1a18c68c3cd5f0664cdc021f198696b098025109bbe8972fa0e92605d1b7
-
SHA512
17d9a7c34bc700b48bfebfbe9fd0279b01c1a76bf92a60970b8617a38cb8b171efa458adf197d530b6ccbfa486dd0a7b65112ffb51fa0a8f69f0e6aeb7a417fa
-
SSDEEP
49152:2v1t62XlaSFNWPjljiFa2RoUYIKLP1JXLoGdkTHHB72eh2NT:2vH62XlaSFNWPjljiFXRoUYIKLL
Behavioral task
behavioral1
Sample
2.exe
Resource
win7-20231020-en
Malware Config
Extracted
quasar
1.4.1
Office04
127.0.0.7:1443
6f01cc79-8527-4436-a34a-473fcf92b46f
-
encryption_key
D52EA8296126E8DD7D221BC02E2826F1CAA96C78
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
2.exe
-
Size
3.1MB
-
MD5
b4383485e556da9e96ccddde2575a37f
-
SHA1
607a3903bb4c5b10bb542fdced5aed35967602e7
-
SHA256
c36d1a18c68c3cd5f0664cdc021f198696b098025109bbe8972fa0e92605d1b7
-
SHA512
17d9a7c34bc700b48bfebfbe9fd0279b01c1a76bf92a60970b8617a38cb8b171efa458adf197d530b6ccbfa486dd0a7b65112ffb51fa0a8f69f0e6aeb7a417fa
-
SSDEEP
49152:2v1t62XlaSFNWPjljiFa2RoUYIKLP1JXLoGdkTHHB72eh2NT:2vH62XlaSFNWPjljiFXRoUYIKLL
-
Quasar payload
-
Executes dropped EXE
-