General
-
Target
Client.exe
-
Size
3.1MB
-
Sample
240411-j5qeesae9x
-
MD5
06c48b0057d41710e891201feb25782a
-
SHA1
1910dedf7da045aa142c2606ee4aa55729241178
-
SHA256
5a0c1f8c117e97ea489329daaf64834554dcabd0263480675c6277b17f70f4f4
-
SHA512
818a46ce9fabaa244d74cffe435ea2e2740bf1e20da49402b3bb1147b994f979cf89e06ee0d3302a8c4fa33d4cfc2dc7f9eeb612125478cef4da9e4899ea9bed
-
SSDEEP
49152:fvnI22SsaNYfdPBldt698dBcjHPCZ1JTLoGdgDfTHHB72eh2NT:fvI22SsaNYfdPBldt6+dBcjHPC5w
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.178.113:4782
3caeec85-698d-4fb5-8dcc-d8a134c7032a
-
encryption_key
84878E668DB7327880C001BFC6CE91226EBE60EF
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
Client.exe
-
Size
3.1MB
-
MD5
06c48b0057d41710e891201feb25782a
-
SHA1
1910dedf7da045aa142c2606ee4aa55729241178
-
SHA256
5a0c1f8c117e97ea489329daaf64834554dcabd0263480675c6277b17f70f4f4
-
SHA512
818a46ce9fabaa244d74cffe435ea2e2740bf1e20da49402b3bb1147b994f979cf89e06ee0d3302a8c4fa33d4cfc2dc7f9eeb612125478cef4da9e4899ea9bed
-
SSDEEP
49152:fvnI22SsaNYfdPBldt698dBcjHPCZ1JTLoGdgDfTHHB72eh2NT:fvI22SsaNYfdPBldt6+dBcjHPC5w
-
Quasar payload
-
Executes dropped EXE
-