General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
240515-l11eyacb71
-
MD5
a5ec52e235b51b62737775708aa75b41
-
SHA1
2fb3d2b31ec5cc4f81d8000ab73e1c42e56d9696
-
SHA256
36e9de882ef9c44bf0b55c230ae42233a142f5d416c114221b6bc6db2eb8d9db
-
SHA512
c89a016cae8e27bbc080300834410e72c00279ea74004f52c1c82bb5293c3abdda0b0aa5634b3157cd88bc81acadeeb4e8114789d0dd292273a3d2871ba094dd
-
SSDEEP
49152:Wv+I22SsaNYfdPBldt698dBcjHR3DkE2HLk/+FMoGdECTHHB72eh2NT:Wvz22SsaNYfdPBldt6+dBcjHR3DMq0
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
1.4.1
FINAL
192.168.1.3:4782
0.tcp.ap.ngrok.io:19777
07349335-02d4-4e1c-9997-b1ec2161a0e1
-
encryption_key
DE496BF144B8EBE8F8D89996CC77BEE88B0F6BCB
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
GET FUCKED
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
a5ec52e235b51b62737775708aa75b41
-
SHA1
2fb3d2b31ec5cc4f81d8000ab73e1c42e56d9696
-
SHA256
36e9de882ef9c44bf0b55c230ae42233a142f5d416c114221b6bc6db2eb8d9db
-
SHA512
c89a016cae8e27bbc080300834410e72c00279ea74004f52c1c82bb5293c3abdda0b0aa5634b3157cd88bc81acadeeb4e8114789d0dd292273a3d2871ba094dd
-
SSDEEP
49152:Wv+I22SsaNYfdPBldt698dBcjHR3DkE2HLk/+FMoGdECTHHB72eh2NT:Wvz22SsaNYfdPBldt6+dBcjHR3DMq0
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-