General
-
Target
4hrtrial.exe
-
Size
3.1MB
-
Sample
240417-vpz5gahf71
-
MD5
6381b4536983c81ec6a1c3486aed6451
-
SHA1
ebf94ca8d7502ee5a16ce9924a1ce84ded7999d2
-
SHA256
ecb8f6aa09ad413541fa0ab18b86012cc289472956579d7034b07ee760c414b2
-
SHA512
9f18835c109b72ff62e1085ec96543188be1c86fec2e8e92b637cdda57cf735976c80eff8e68bbc15b80be7f4848a8effd8eb5c41874041cac676a4dca88beac
-
SSDEEP
49152:qvkt62XlaSFNWPjljiFa2RoUYIWtiSXeoGd9TTTHHB72eh2NT:qv462XlaSFNWPjljiFXRoUYIWtiSux
Behavioral task
behavioral1
Sample
4hrtrial.exe
Resource
win11-20240412-en
Malware Config
Extracted
quasar
1.4.1
randomexec
192.168.1.210:4782
cc040a17-651a-4e8d-89e0-1e1ee4ecd311
-
encryption_key
F1228A931AFA9A7BB15908784C583B04E24F1AE2
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
..
-
subdirectory
SubDir
Targets
-
-
Target
4hrtrial.exe
-
Size
3.1MB
-
MD5
6381b4536983c81ec6a1c3486aed6451
-
SHA1
ebf94ca8d7502ee5a16ce9924a1ce84ded7999d2
-
SHA256
ecb8f6aa09ad413541fa0ab18b86012cc289472956579d7034b07ee760c414b2
-
SHA512
9f18835c109b72ff62e1085ec96543188be1c86fec2e8e92b637cdda57cf735976c80eff8e68bbc15b80be7f4848a8effd8eb5c41874041cac676a4dca88beac
-
SSDEEP
49152:qvkt62XlaSFNWPjljiFa2RoUYIWtiSXeoGd9TTTHHB72eh2NT:qv462XlaSFNWPjljiFXRoUYIWtiSux
Score10/10-
Quasar payload
-
Executes dropped EXE
-
Adds Run key to start application
-