General
-
Target
Susano1.2.8.4.exe
-
Size
3.1MB
-
Sample
240222-r438wsbf77
-
MD5
498e6ea83d15de9992d85def43a2dbed
-
SHA1
8ee13f8f6e837969b3d7f436ad4c2289697d2e28
-
SHA256
03eeaf1a696b1ea49360ec5627e16ed94a0766871fe6cd59c94ea939578d0cd8
-
SHA512
a65a9d14b834063271009529f25800022ebeb26b67f65821e18be0e6baf06a2deb0deb7b28c5ab90cda0b176d6db327d2d86abdee517e68d8bb837e5622299ec
-
SSDEEP
49152:Svkt62XlaSFNWPjljiFa2RoUYIgeaHsk2vGZLoGA1THHB72eh2NT:Sv462XlaSFNWPjljiFXRoUYIvk5
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.17:4782
5f210934-2354-4459-805f-4058e2fbbc65
-
encryption_key
E1F939A59A57A4E0EEC874A8DA31E5D32414EEAA
-
install_name
Client.exe
-
log_directory
susano
-
reconnect_delay
3000
-
startup_key
discord32
-
subdirectory
SubDir
Targets
-
-
Target
Susano1.2.8.4.exe
-
Size
3.1MB
-
MD5
498e6ea83d15de9992d85def43a2dbed
-
SHA1
8ee13f8f6e837969b3d7f436ad4c2289697d2e28
-
SHA256
03eeaf1a696b1ea49360ec5627e16ed94a0766871fe6cd59c94ea939578d0cd8
-
SHA512
a65a9d14b834063271009529f25800022ebeb26b67f65821e18be0e6baf06a2deb0deb7b28c5ab90cda0b176d6db327d2d86abdee517e68d8bb837e5622299ec
-
SSDEEP
49152:Svkt62XlaSFNWPjljiFa2RoUYIgeaHsk2vGZLoGA1THHB72eh2NT:Sv462XlaSFNWPjljiFXRoUYIvk5
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-