General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
240515-a98xwsha7t
-
MD5
4154355d39cb3f7ec6be0222e2508773
-
SHA1
d1b57f612acddc4c59bf901a5bf74df5ade13280
-
SHA256
7dae1d89f38e6fd6cd87d4c6619573ac8c0140af985896ad553cac26edc3b78a
-
SHA512
1efcd1714c72d0569e579e3746b057bf076a31a655148e31d8366a74912be2b57e6d00dfa75e0e770de9cee6959383a5bda630abae20530425c39e63769ac49e
-
SSDEEP
49152:3vrI22SsaNYfdPBldt698dBcjHSv41mzpEoGdVHTHHB72eh2NT:3vU22SsaNYfdPBldt6+dBcjHK4b
Malware Config
Extracted
quasar
1.4.1
Office04
lolimaginerattin24-26181.portmap.host:26181
5322b71c-e6d1-4271-a40e-ed1736164335
-
encryption_key
9C4EA8E0DF89BE6122CBCA3F1DCCDAE968F75366
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
msservice
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
4154355d39cb3f7ec6be0222e2508773
-
SHA1
d1b57f612acddc4c59bf901a5bf74df5ade13280
-
SHA256
7dae1d89f38e6fd6cd87d4c6619573ac8c0140af985896ad553cac26edc3b78a
-
SHA512
1efcd1714c72d0569e579e3746b057bf076a31a655148e31d8366a74912be2b57e6d00dfa75e0e770de9cee6959383a5bda630abae20530425c39e63769ac49e
-
SSDEEP
49152:3vrI22SsaNYfdPBldt698dBcjHSv41mzpEoGdVHTHHB72eh2NT:3vU22SsaNYfdPBldt6+dBcjHK4b
-
Quasar payload
-
Executes dropped EXE
-