General
-
Target
6c7dd8aacaecedde1b47ec83fd5468b1bf57a7c05a8389d4ea8137e043a8da91
-
Size
3.1MB
-
Sample
240513-rx7bzaad4y
-
MD5
87bf8eb962d3eaf56335a996eb0c2762
-
SHA1
4d9abe61ca7bd301d6c129ca526f81e3a5271091
-
SHA256
6c7dd8aacaecedde1b47ec83fd5468b1bf57a7c05a8389d4ea8137e043a8da91
-
SHA512
b3d0d8d233f1a7edf6054f918759995ddc29150d4dda6d62ef6f955492e063efa6c22d4acf6cabbea3a845c02773b70d6eda5fbb9262c0a75cac7210146325f0
-
SSDEEP
49152:OvbI22SsaNYfdPBldt698dBcjHMgxNESErk/ivLoGdwGTHHB72eh2NT:Ovk22SsaNYfdPBldt6+dBcjHjx6z
Behavioral task
behavioral1
Sample
6c7dd8aacaecedde1b47ec83fd5468b1bf57a7c05a8389d4ea8137e043a8da91.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
quasar
1.4.1
Office04
7.tcp.eu.ngrok.io:13231
0e48a3c0-ec07-40d4-9510-7c0b54727d37
-
encryption_key
8BCC1AD76EF38CD8450D4884BA579580305F0B81
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
6c7dd8aacaecedde1b47ec83fd5468b1bf57a7c05a8389d4ea8137e043a8da91
-
Size
3.1MB
-
MD5
87bf8eb962d3eaf56335a996eb0c2762
-
SHA1
4d9abe61ca7bd301d6c129ca526f81e3a5271091
-
SHA256
6c7dd8aacaecedde1b47ec83fd5468b1bf57a7c05a8389d4ea8137e043a8da91
-
SHA512
b3d0d8d233f1a7edf6054f918759995ddc29150d4dda6d62ef6f955492e063efa6c22d4acf6cabbea3a845c02773b70d6eda5fbb9262c0a75cac7210146325f0
-
SSDEEP
49152:OvbI22SsaNYfdPBldt698dBcjHMgxNESErk/ivLoGdwGTHHB72eh2NT:Ovk22SsaNYfdPBldt6+dBcjHjx6z
-
Quasar payload
-
Legitimate hosting services abused for malware hosting/C2
-