General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
240529-eh157aae65
-
MD5
edd373e0c5b33b63857417fe30229b22
-
SHA1
fd1834882a6c411b97a51f2e1ddb57058465fdc3
-
SHA256
9b906e8b6e09cdb3ad9d100dcb77df6f30e0a88c1fb164ea491a9e6fdd823083
-
SHA512
80ffb0dfe71ca3bc6e7b414d2ba8924a99e481e36aadbc9a176571d121556637fa50621509886030959dd48e6419d0fe4f3c20ce56a304912c5259d8fd0dd9d5
-
SSDEEP
49152:+vSI22SsaNYfdPBldt698dBcjHdExk1v4LoG+8GQ0THHB72eh2NT:+v/22SsaNYfdPBldt6+dBcjHdExnG
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
1.4.1
Office04
10.0.0.5:55976
127.0.0.1:12995
fd7766f9-01b8-4f7d-9510-71226643b102
-
encryption_key
1A0BB6F7E6C51A39D122080A266E59E4C6D10FA8
-
install_name
Centixwareinstaller.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows 11 Dir
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
edd373e0c5b33b63857417fe30229b22
-
SHA1
fd1834882a6c411b97a51f2e1ddb57058465fdc3
-
SHA256
9b906e8b6e09cdb3ad9d100dcb77df6f30e0a88c1fb164ea491a9e6fdd823083
-
SHA512
80ffb0dfe71ca3bc6e7b414d2ba8924a99e481e36aadbc9a176571d121556637fa50621509886030959dd48e6419d0fe4f3c20ce56a304912c5259d8fd0dd9d5
-
SSDEEP
49152:+vSI22SsaNYfdPBldt698dBcjHdExk1v4LoG+8GQ0THHB72eh2NT:+v/22SsaNYfdPBldt6+dBcjHdExnG
-
Quasar payload
-
Executes dropped EXE
-