General
-
Target
Beta2.exe
-
Size
3.1MB
-
Sample
240530-qe4mpahf9y
-
MD5
deabfd991ccd55517081cc6d10c58e97
-
SHA1
98fb943a6714593ebb567b966702fcad7fb1448d
-
SHA256
dfb168d8f6a43b1348d9ed49f0ab38365f31987512212a8afae9a311f47f135f
-
SHA512
0f92d1291e4c8469ff8c891a2528d211fc78d3c81b5351f2cd9821077d9aeda7429c271c48f0056c0a12cd290f48156b5d72fe4c333e7ff0fec2b639c1931aea
-
SSDEEP
49152:6vBt62XlaSFNWPjljiFa2RoUYIhnU2jrozd3oGTHHB72eh2NT:6vr62XlaSFNWPjljiFXRoUYIZU2H
Behavioral task
behavioral1
Sample
Beta2.exe
Resource
win7-20240508-en
Malware Config
Extracted
quasar
1.4.1
Office04
arthurus36off.ddns.net:5555
8bf6ad28-ed30-4fe9-9644-9753c363c3b0
-
encryption_key
6314C8C60AA1035CEB920FD38F0342E398BAF5D0
-
install_name
Client2.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
WinSysol
Targets
-
-
Target
Beta2.exe
-
Size
3.1MB
-
MD5
deabfd991ccd55517081cc6d10c58e97
-
SHA1
98fb943a6714593ebb567b966702fcad7fb1448d
-
SHA256
dfb168d8f6a43b1348d9ed49f0ab38365f31987512212a8afae9a311f47f135f
-
SHA512
0f92d1291e4c8469ff8c891a2528d211fc78d3c81b5351f2cd9821077d9aeda7429c271c48f0056c0a12cd290f48156b5d72fe4c333e7ff0fec2b639c1931aea
-
SSDEEP
49152:6vBt62XlaSFNWPjljiFa2RoUYIhnU2jrozd3oGTHHB72eh2NT:6vr62XlaSFNWPjljiFXRoUYIZU2H
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-