General
-
Target
e239b94abea0865e20ffa64cbfb92ad6e8e6cfa27a8e76cbf6296249bc9a400c
-
Size
3.1MB
-
Sample
240217-kgmjasde47
-
MD5
caf393a71a77029af657ffb94891c7ad
-
SHA1
50396e69b69eaed5bace7e7ee78c0e800ccd3bd8
-
SHA256
e239b94abea0865e20ffa64cbfb92ad6e8e6cfa27a8e76cbf6296249bc9a400c
-
SHA512
6e1902715cbe8e4361d78a456ed0a0e9f4b006fa0da26c2772831f90ef2b0cf54fb9e28693267a897da79db08d5210eb3610dc0d3f2344e474406a20a0a3ed1f
-
SSDEEP
49152:6vUt62XlaSFNWPjljiFa2RoUYINbRJ6bbR3LoGdwTHHB72eh2NT:6vI62XlaSFNWPjljiFXRoUYINbRJ6t
Behavioral task
behavioral1
Sample
e239b94abea0865e20ffa64cbfb92ad6e8e6cfa27a8e76cbf6296249bc9a400c.exe
Resource
win7-20231215-en
Malware Config
Extracted
quasar
1.4.1
test1
192.168.7.1:4782
7081b1dc-8e40-425a-b35c-eefe4118ec89
-
encryption_key
A325F4C7D792609E547B8E6F270377A451246134
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
2000
-
startup_key
Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
e239b94abea0865e20ffa64cbfb92ad6e8e6cfa27a8e76cbf6296249bc9a400c
-
Size
3.1MB
-
MD5
caf393a71a77029af657ffb94891c7ad
-
SHA1
50396e69b69eaed5bace7e7ee78c0e800ccd3bd8
-
SHA256
e239b94abea0865e20ffa64cbfb92ad6e8e6cfa27a8e76cbf6296249bc9a400c
-
SHA512
6e1902715cbe8e4361d78a456ed0a0e9f4b006fa0da26c2772831f90ef2b0cf54fb9e28693267a897da79db08d5210eb3610dc0d3f2344e474406a20a0a3ed1f
-
SSDEEP
49152:6vUt62XlaSFNWPjljiFa2RoUYINbRJ6bbR3LoGdwTHHB72eh2NT:6vI62XlaSFNWPjljiFXRoUYINbRJ6t
-
Quasar payload
-
Executes dropped EXE
-