General
-
Target
7402de539089b009b82d0d643d7b78234c792407d18ab99fd68de78493dede31.exe
-
Size
3.1MB
-
Sample
240612-xycrmszgpm
-
MD5
cded3e935b1541f8e930f07e8829f551
-
SHA1
e7fc4bc9525e5b04b6877ed362ecfcec83fa2d8c
-
SHA256
7402de539089b009b82d0d643d7b78234c792407d18ab99fd68de78493dede31
-
SHA512
dd979da2ee725fcdb49a094617fd8e41a283f3dbd809fd939c009ff5609a29e0042be7c6d92cf30c1219b0a9d56ee406a865d1e32ef5b56fdc1f3580bce83d05
-
SSDEEP
49152:rvSI22SsaNYfdPBldt698dBcjHPCbm9mz6yoGdBTHHB72eh2NT:rv/22SsaNYfdPBldt6+dBcjHabmw
Behavioral task
behavioral1
Sample
7402de539089b009b82d0d643d7b78234c792407d18ab99fd68de78493dede31.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
7402de539089b009b82d0d643d7b78234c792407d18ab99fd68de78493dede31.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
quasar
1.4.1
vcruntime140
192.168.178.57:4782
b358e7e9-0f3b-4d47-8e56-2ccc087705cb
-
encryption_key
B1736A0DDBD7AF739BB0E3FE61B51CEFF7F8DDB3
-
install_name
vcruntime140.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
vcruntime140
-
subdirectory
SubDir
Targets
-
-
Target
7402de539089b009b82d0d643d7b78234c792407d18ab99fd68de78493dede31.exe
-
Size
3.1MB
-
MD5
cded3e935b1541f8e930f07e8829f551
-
SHA1
e7fc4bc9525e5b04b6877ed362ecfcec83fa2d8c
-
SHA256
7402de539089b009b82d0d643d7b78234c792407d18ab99fd68de78493dede31
-
SHA512
dd979da2ee725fcdb49a094617fd8e41a283f3dbd809fd939c009ff5609a29e0042be7c6d92cf30c1219b0a9d56ee406a865d1e32ef5b56fdc1f3580bce83d05
-
SSDEEP
49152:rvSI22SsaNYfdPBldt698dBcjHPCbm9mz6yoGdBTHHB72eh2NT:rv/22SsaNYfdPBldt6+dBcjHabmw
Score10/10-
Quasar payload
-
Executes dropped EXE
-