General
-
Target
sus.exe
-
Size
3.1MB
-
Sample
240612-jplfjavekb
-
MD5
40b9b1af42e85013341d3994eb9857ac
-
SHA1
4cbaf05241707575b8bba65491e4771af3579b22
-
SHA256
74bd2c08f9f127d8dbc5bf408568cdaf8f32b9afc9823abde3b6123b0da25c98
-
SHA512
67480043dc18942b3895ca0914bb518fc865fa9a6669e1fba87b213c9c1b2939824c710b38a9f5a5e088c8b889f8022a4d467356e9c32ae231ab89cb36fa6c05
-
SSDEEP
49152:mv/I22SsaNYfdPBldt698dBcjHKGxNESEyk/iILoGdz4THHB72eh2NT:mvQ22SsaNYfdPBldt6+dBcjHbxNm
Behavioral task
behavioral1
Sample
sus.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
1.4.1
niga
192.168.0.106:4782
d4922296-6b1c-4eb8-9900-8245ddd677af
-
encryption_key
ED126047C03399C2E91AEC0EB5284E8942B0414E
-
install_name
asdkwk.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
kreiasad
Targets
-
-
Target
sus.exe
-
Size
3.1MB
-
MD5
40b9b1af42e85013341d3994eb9857ac
-
SHA1
4cbaf05241707575b8bba65491e4771af3579b22
-
SHA256
74bd2c08f9f127d8dbc5bf408568cdaf8f32b9afc9823abde3b6123b0da25c98
-
SHA512
67480043dc18942b3895ca0914bb518fc865fa9a6669e1fba87b213c9c1b2939824c710b38a9f5a5e088c8b889f8022a4d467356e9c32ae231ab89cb36fa6c05
-
SSDEEP
49152:mv/I22SsaNYfdPBldt698dBcjHKGxNESEyk/iILoGdz4THHB72eh2NT:mvQ22SsaNYfdPBldt6+dBcjHbxNm
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-