General
-
Target
Client.exe
-
Size
3.1MB
-
Sample
240323-197ypsdc79
-
MD5
8eec6e82f824e964f6a6ae25f97c2b26
-
SHA1
dd746bd25682356e5a73d0f447e3d0de6907d33d
-
SHA256
78e61085e07c0c08e8127b12da6c923a5d2e42929d86d84c82826ea43e2a1128
-
SHA512
f3d6b88f449ff1532b0177f1cd5e940163101a834f8faba1cd4131c72b56c2c75b98aac6568addc933852e0e59decdf999266dc15b86a330daf74acdeb53774d
-
SSDEEP
49152:yvht62XlaSFNWPjljiFa2RoUYIU+qXBxHeoGdzTHHB72eh2NT:yvL62XlaSFNWPjljiFXRoUYIJqK
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240319-en
Malware Config
Extracted
quasar
1.4.1
Slave
140.238.91.110:45359
f8ed2643-0827-4252-bfbe-ca79f67643cb
-
encryption_key
52BB87E2CC96F5243DED8FFD41978ED5C07DF11C
-
install_name
Steam.exe
-
log_directory
Error Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Targets
-
-
Target
Client.exe
-
Size
3.1MB
-
MD5
8eec6e82f824e964f6a6ae25f97c2b26
-
SHA1
dd746bd25682356e5a73d0f447e3d0de6907d33d
-
SHA256
78e61085e07c0c08e8127b12da6c923a5d2e42929d86d84c82826ea43e2a1128
-
SHA512
f3d6b88f449ff1532b0177f1cd5e940163101a834f8faba1cd4131c72b56c2c75b98aac6568addc933852e0e59decdf999266dc15b86a330daf74acdeb53774d
-
SSDEEP
49152:yvht62XlaSFNWPjljiFa2RoUYIU+qXBxHeoGdzTHHB72eh2NT:yvL62XlaSFNWPjljiFXRoUYIJqK
-
Quasar payload
-
Executes dropped EXE
-