General
-
Target
be1aee7f2f23134ba2fb4f2d05a5c5819518f88ccaba7fcbf2524ceda72f6ff5
-
Size
3.1MB
-
Sample
240509-rs5ycahc32
-
MD5
37d9cc2f98c4cbfea148c153ead3d63d
-
SHA1
67245419711e511b4b06836526dd3eca8296f7d2
-
SHA256
be1aee7f2f23134ba2fb4f2d05a5c5819518f88ccaba7fcbf2524ceda72f6ff5
-
SHA512
8a1b6398f30afa7c023d501f149a22d66ea134ab0ba381f1dc4f5c99d03270aac65971f4d7bef66a9d290eda3b4484a17a4a08f82c331201001423f8cb21929e
-
SSDEEP
49152:avBt62XlaSFNWPjljiFa2RoUYIXxOEMktk/JxfoGdcTHHB72eh2NT:avr62XlaSFNWPjljiFXRoUYIXxwl
Behavioral task
behavioral1
Sample
be1aee7f2f23134ba2fb4f2d05a5c5819518f88ccaba7fcbf2524ceda72f6ff5.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.0.120:4782
9fde5542-6125-4272-a814-17dab286fa9f
-
encryption_key
7D71500E67A8C0039FEB5CC2A22FA4DAC65EF711
-
install_name
Temp.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Targets
-
-
Target
be1aee7f2f23134ba2fb4f2d05a5c5819518f88ccaba7fcbf2524ceda72f6ff5
-
Size
3.1MB
-
MD5
37d9cc2f98c4cbfea148c153ead3d63d
-
SHA1
67245419711e511b4b06836526dd3eca8296f7d2
-
SHA256
be1aee7f2f23134ba2fb4f2d05a5c5819518f88ccaba7fcbf2524ceda72f6ff5
-
SHA512
8a1b6398f30afa7c023d501f149a22d66ea134ab0ba381f1dc4f5c99d03270aac65971f4d7bef66a9d290eda3b4484a17a4a08f82c331201001423f8cb21929e
-
SSDEEP
49152:avBt62XlaSFNWPjljiFa2RoUYIXxOEMktk/JxfoGdcTHHB72eh2NT:avr62XlaSFNWPjljiFXRoUYIXxwl
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-