General
-
Target
image_logger.exe
-
Size
3.1MB
-
Sample
240601-qs8tkaec99
-
MD5
87548af645ae05d1270e35bab6c7180c
-
SHA1
186758774e90f0f88537a2223f2919cce582a3b3
-
SHA256
740eae2194c61a026196e3e6e0ebd629d4b876f8e591fdfd0b662878a86546e0
-
SHA512
9e36a35d7c96f78401331d47f17a7dc127ffcf254c748f93f1fba41c91aa8886dd305a97d54acf743576659143b534af174adcd0625f10e03b931ba42c234604
-
SSDEEP
49152:rvXI22SsaNYfdPBldt698dBcjHRpRJ6sbR3LoGdJqTHHB72eh2NT:rvY22SsaNYfdPBldt6+dBcjHRpRJ62Z
Behavioral task
behavioral1
Sample
image_logger.exe
Resource
win7-20240508-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.146:4782
34162b02-2762-4654-b588-2cfc3f9d49d6
-
encryption_key
53AE412E3C7FE26F176F4B85B9D37FEA82C46128
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
image_logger.exe
-
Size
3.1MB
-
MD5
87548af645ae05d1270e35bab6c7180c
-
SHA1
186758774e90f0f88537a2223f2919cce582a3b3
-
SHA256
740eae2194c61a026196e3e6e0ebd629d4b876f8e591fdfd0b662878a86546e0
-
SHA512
9e36a35d7c96f78401331d47f17a7dc127ffcf254c748f93f1fba41c91aa8886dd305a97d54acf743576659143b534af174adcd0625f10e03b931ba42c234604
-
SSDEEP
49152:rvXI22SsaNYfdPBldt698dBcjHRpRJ6sbR3LoGdJqTHHB72eh2NT:rvY22SsaNYfdPBldt6+dBcjHRpRJ62Z
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-