General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
240613-d417mssgpa
-
MD5
69310053c471afd15d59e86a65bf8d9f
-
SHA1
97811a97d9bee8e5737472f55f1ccfa97c01bc8d
-
SHA256
6651ec6dff9d3df79f30b2b59e175f6169efbabd805e19da313be7654e7874b3
-
SHA512
fc7dd986cfc597b62a48da0f48191485943702d68aa08a7191c4e5a592a1770801d33447a372a6119fc1bd6580bc19d238d1637824aafb5a04c93e07dee9c018
-
SSDEEP
49152:FvlY52fyaSZOrPWluWBuGG5g5hA+/3varSVoGdWBTHHB72eh2NT:Fvy52fyaSZOrPWluWBDG5g5hp3Fm
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
1.4.1
Office04
127.0.0.1:4040
ccff5d2b-8b09-4307-aa1c-16eec51a02b2
-
encryption_key
E1BD3EC68D46CE94607738B70CCE811ABD63A3D7
-
install_name
YAYAY.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Update
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
69310053c471afd15d59e86a65bf8d9f
-
SHA1
97811a97d9bee8e5737472f55f1ccfa97c01bc8d
-
SHA256
6651ec6dff9d3df79f30b2b59e175f6169efbabd805e19da313be7654e7874b3
-
SHA512
fc7dd986cfc597b62a48da0f48191485943702d68aa08a7191c4e5a592a1770801d33447a372a6119fc1bd6580bc19d238d1637824aafb5a04c93e07dee9c018
-
SSDEEP
49152:FvlY52fyaSZOrPWluWBuGG5g5hA+/3varSVoGdWBTHHB72eh2NT:Fvy52fyaSZOrPWluWBDG5g5hp3Fm
-
Quasar payload
-
Executes dropped EXE
-