General
-
Target
6de9efd795fe73eeb521b0780330a92e947d6019d2e9b17beba1c36472b463d1
-
Size
3.1MB
-
Sample
240331-jh7eesgg43
-
MD5
22afa096fc6c8ce6b3c60566e7b41c37
-
SHA1
33d0f33ea8bf5bfa2c6e02aeb662593d9a4085a7
-
SHA256
6de9efd795fe73eeb521b0780330a92e947d6019d2e9b17beba1c36472b463d1
-
SHA512
59eb53c41b5c3884cae8a597554c380e3a38092816cbbbe58b384d4e47d90c845be5d5cf78b3c46eceed9eba279b77cec0fdcdd6b8c92d19c850d60d9ea9c875
-
SSDEEP
49152:qvKI22SsaNYfdPBldt698dBcjH/WRJ6kbR3LoGdZTHHB72eh2NT:qvn22SsaNYfdPBldt6+dBcjH/WRJ6u
Behavioral task
behavioral1
Sample
6de9efd795fe73eeb521b0780330a92e947d6019d2e9b17beba1c36472b463d1.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
quasar
1.4.1
System
applereports.ddns.net:4782
3d9fa69f-5f42-4669-9ddb-045d48b0bd41
-
encryption_key
B6CDE8700F6B9BF3EDD9D9B86838C8E30C43F685
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
6de9efd795fe73eeb521b0780330a92e947d6019d2e9b17beba1c36472b463d1
-
Size
3.1MB
-
MD5
22afa096fc6c8ce6b3c60566e7b41c37
-
SHA1
33d0f33ea8bf5bfa2c6e02aeb662593d9a4085a7
-
SHA256
6de9efd795fe73eeb521b0780330a92e947d6019d2e9b17beba1c36472b463d1
-
SHA512
59eb53c41b5c3884cae8a597554c380e3a38092816cbbbe58b384d4e47d90c845be5d5cf78b3c46eceed9eba279b77cec0fdcdd6b8c92d19c850d60d9ea9c875
-
SSDEEP
49152:qvKI22SsaNYfdPBldt698dBcjH/WRJ6kbR3LoGdZTHHB72eh2NT:qvn22SsaNYfdPBldt6+dBcjH/WRJ6u
-
Quasar payload
-