General
-
Target
VegasPatch14.qqq
-
Size
3.1MB
-
Sample
240114-1kewmadcdk
-
MD5
b4ec8778cbe46c171a9bee3e9506de4c
-
SHA1
85a13ca777b14db2364c3e25ba6f3d5ab103ea8e
-
SHA256
c50658509115ca06fce94d1419fbec714e8fcc5a1cde23e037e8d6f8d3b2571d
-
SHA512
45d2d561b0dcd891d8b10b307a8a0ea8fc0fe4a8c78eab52e8162cbd6872b8d8810878282bb8f5b36ecc6ed0b25383078da2eb62346862d34e6a46b4c068477f
-
SSDEEP
49152:WvXI22SsaNYfdPBldt698dBcjHeupm2mzrToGd9THHB72eh2NT:WvY22SsaNYfdPBldt6+dBcjH5pmL
Behavioral task
behavioral1
Sample
VegasPatch14.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VegasPatch14.exe
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
VegasPatch14.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
quasar
1.4.1
build1
testnetwork123.ddns.net:4782
b4867e2a-84d0-48aa-a9d7-3bec9fee8df9
-
encryption_key
EFAB993C2F127EF7DC90902AD3F43CBA897B6832
-
install_name
WinVs.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Visual Mapping
-
subdirectory
SubDir
Targets
-
-
Target
VegasPatch14.qqq
-
Size
3.1MB
-
MD5
b4ec8778cbe46c171a9bee3e9506de4c
-
SHA1
85a13ca777b14db2364c3e25ba6f3d5ab103ea8e
-
SHA256
c50658509115ca06fce94d1419fbec714e8fcc5a1cde23e037e8d6f8d3b2571d
-
SHA512
45d2d561b0dcd891d8b10b307a8a0ea8fc0fe4a8c78eab52e8162cbd6872b8d8810878282bb8f5b36ecc6ed0b25383078da2eb62346862d34e6a46b4c068477f
-
SSDEEP
49152:WvXI22SsaNYfdPBldt698dBcjHeupm2mzrToGd9THHB72eh2NT:WvY22SsaNYfdPBldt6+dBcjH5pmL
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-