General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
240328-xwztdsea8w
-
MD5
9a8853b2d14a1cc2779bca39bbec62b2
-
SHA1
93fed5da8104e34f9c42a5e59227829a86d3795d
-
SHA256
d72775e6603951c44c96ac31885bca2efb1358c86473a1f2e33c98a62a73a4ac
-
SHA512
c249f9d236bd5bae249cce6be833d5f4ea725efb1c6f79afc30e28657472ce4e6e6ce281c1c14d31974f05e7a0f3555e513886df63b5c326ade7e8239d8de43e
-
SSDEEP
49152:DvrI22SsaNYfdPBldt698dBcjHyjyPzoGroTHHB72eh2NT:DvU22SsaNYfdPBldt6+dBcjHyjyr
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240319-en
Malware Config
Extracted
quasar
1.4.1
Slave
xcoderreal-54839.portmap.host:54839
276d9dc6-b19c-4958-8ac3-89586bd3b515
-
encryption_key
ABCF70C37D1A79A01712038122D1532DF20DF72A
-
install_name
Client.exe
-
log_directory
Error Logs
-
reconnect_delay
3000
-
startup_key
WOS64
-
subdirectory
Windows
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
9a8853b2d14a1cc2779bca39bbec62b2
-
SHA1
93fed5da8104e34f9c42a5e59227829a86d3795d
-
SHA256
d72775e6603951c44c96ac31885bca2efb1358c86473a1f2e33c98a62a73a4ac
-
SHA512
c249f9d236bd5bae249cce6be833d5f4ea725efb1c6f79afc30e28657472ce4e6e6ce281c1c14d31974f05e7a0f3555e513886df63b5c326ade7e8239d8de43e
-
SSDEEP
49152:DvrI22SsaNYfdPBldt698dBcjHyjyPzoGroTHHB72eh2NT:DvU22SsaNYfdPBldt6+dBcjHyjyr
-
Quasar payload
-
Executes dropped EXE
-