General
-
Target
client2.exe
-
Size
3.1MB
-
Sample
240406-m76qzagh61
-
MD5
bf2ca3b55e94adb3f3bc2f88599fafb9
-
SHA1
0b350cb542c831b5e93aaaffdf40ad9423a1f7b5
-
SHA256
338ef3e915cb19fb76ee6480a534e32053ef189057300c826f133cfd924de34f
-
SHA512
be3bc6a111136a4b5e8cac9fe62c2e0f61628846f6804f704d4d946a1c4c1dc44dd75729406fedf1a42b4e8f454bab5b6a2170c0e6b8f38f17755629616ceabe
-
SSDEEP
49152:ev0t62XlaSFNWPjljiFa2RoUYIZ814wDMR3aoGdZdTHHB72eh2NT:evo62XlaSFNWPjljiFXRoUYIZI42J
Behavioral task
behavioral1
Sample
client2.exe
Resource
win7-20240220-en
Malware Config
Extracted
quasar
1.4.1
Office04
212.192.31.211:4782
8cff6bf4-0204-41b6-9e13-a2edafea559f
-
encryption_key
8297B625B7067758953DBD6939F74AE8EE2234C3
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
client2.exe
-
Size
3.1MB
-
MD5
bf2ca3b55e94adb3f3bc2f88599fafb9
-
SHA1
0b350cb542c831b5e93aaaffdf40ad9423a1f7b5
-
SHA256
338ef3e915cb19fb76ee6480a534e32053ef189057300c826f133cfd924de34f
-
SHA512
be3bc6a111136a4b5e8cac9fe62c2e0f61628846f6804f704d4d946a1c4c1dc44dd75729406fedf1a42b4e8f454bab5b6a2170c0e6b8f38f17755629616ceabe
-
SSDEEP
49152:ev0t62XlaSFNWPjljiFa2RoUYIZ814wDMR3aoGdZdTHHB72eh2NT:evo62XlaSFNWPjljiFXRoUYIZI42J
-
Quasar payload
-