General
-
Target
Client-built.exe
-
Size
348KB
-
Sample
240601-tzee3sgf3s
-
MD5
0b7139d2d35eb6fb4638ec14b469df7e
-
SHA1
5b3644a8be1e3ef885b5809b857142295ed2a4d1
-
SHA256
947ecae6beac19b2fe2154f68940462655843cd5f36db14c0ab0b57cff623138
-
SHA512
84ae5d2017f268a1249ab1346de9ebda1ab41621b790ecd24cc75df95e9d8415720395b022d4f367819eda642b19a42f31bf50b87a4d980237471b6dcb1041c9
-
SSDEEP
6144:0jEHwNHJsa2gKMRQDbRFunXCpsIqlfoF:Cxpsa8W6uXC3qRO
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
quasar
1.3.0.0
Deadly
uk2.localto.net:3955
QSR_MUTEX_Kpy5UOokQcRvJFzawH
-
encryption_key
42mkSeUsHVtyogVkUtuz
-
install_name
$dead-Client.exe
-
log_directory
$dead-Logs
-
reconnect_delay
3000
-
startup_key
Powershell
-
subdirectory
$dead-deadly2
Targets
-
-
Target
Client-built.exe
-
Size
348KB
-
MD5
0b7139d2d35eb6fb4638ec14b469df7e
-
SHA1
5b3644a8be1e3ef885b5809b857142295ed2a4d1
-
SHA256
947ecae6beac19b2fe2154f68940462655843cd5f36db14c0ab0b57cff623138
-
SHA512
84ae5d2017f268a1249ab1346de9ebda1ab41621b790ecd24cc75df95e9d8415720395b022d4f367819eda642b19a42f31bf50b87a4d980237471b6dcb1041c9
-
SSDEEP
6144:0jEHwNHJsa2gKMRQDbRFunXCpsIqlfoF:Cxpsa8W6uXC3qRO
-
Quasar payload
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-