General
-
Target
Client.exe
-
Size
3.1MB
-
Sample
231231-3rpqhsgbfl
-
MD5
bb47e86745b64c55c469e2ad17516b47
-
SHA1
b8661185e0af4569c881362fc0a10567c361f9b6
-
SHA256
6413b46b839e53cd7eca27f925f7439321f5c7b50d204528b00546b9cf4eb837
-
SHA512
c8840e504b20d4330ac4c99c35d8cf607f526f7ece3ece00fcf60a9fc0f7024c33b596847eea85f9f75ba0a1a3e744c24a9de2ba62c768649137de1580acf5e6
-
SSDEEP
49152:uvKY52fyaSZOrPWluWBuGG5g5h/0Ha95bQDk/mLoGdzSTHHB72eh2NT:uv/52fyaSZOrPWluWBDG5g5hEaM
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20231215-en
Malware Config
Extracted
quasar
1.4.1
update
127.0.0.1:4782
ddb0d81d-667e-44c3-a1b7-00fcb82dd1ef
-
encryption_key
00DF680B0E09235E9256570DFF972BC701444E37
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
putty
-
subdirectory
SubDir
Targets
-
-
Target
Client.exe
-
Size
3.1MB
-
MD5
bb47e86745b64c55c469e2ad17516b47
-
SHA1
b8661185e0af4569c881362fc0a10567c361f9b6
-
SHA256
6413b46b839e53cd7eca27f925f7439321f5c7b50d204528b00546b9cf4eb837
-
SHA512
c8840e504b20d4330ac4c99c35d8cf607f526f7ece3ece00fcf60a9fc0f7024c33b596847eea85f9f75ba0a1a3e744c24a9de2ba62c768649137de1580acf5e6
-
SSDEEP
49152:uvKY52fyaSZOrPWluWBuGG5g5h/0Ha95bQDk/mLoGdzSTHHB72eh2NT:uv/52fyaSZOrPWluWBDG5g5hEaM
-
Quasar payload
-
Executes dropped EXE
-