General
-
Target
Holyskbiidid.exe
-
Size
3.1MB
-
Sample
240617-3n9lhsyfrc
-
MD5
d0212fe437969d03c652387b019b750f
-
SHA1
e5b9052a98450575e92dec41b8560492ecf61838
-
SHA256
c4af2eb6696cbbeef196266da22b17a6ea46ded86cd271fa6422e77d1f6f33d1
-
SHA512
af7e2330b0107ad9a8d21a4974cf577258474378cccfa0ca269679e34b802a1e4c104de10e9e4469bc2c92584a0b646e5fe3393387655f1b1ade02f271d483a2
-
SSDEEP
49152:qvWI22SsaNYfdPBldt698dBcjHlhOEEfsLk/HYXoGd7THHB72eh2NT:qv722SsaNYfdPBldt6+dBcjHlhOHg
Behavioral task
behavioral1
Sample
Holyskbiidid.exe
Resource
win7-20240508-en
Malware Config
Extracted
quasar
1.4.1
Eyewalled
147.185.221.18:18043
147.185.221.18:1358
0ec4c1af-30af-44b2-ab2f-6813ea42dd9d
-
encryption_key
DF93BFF0E78CC9BB874112E9F60DEDC5B7B04CB5
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3001
-
startup_key
Github.git
-
subdirectory
Management
Targets
-
-
Target
Holyskbiidid.exe
-
Size
3.1MB
-
MD5
d0212fe437969d03c652387b019b750f
-
SHA1
e5b9052a98450575e92dec41b8560492ecf61838
-
SHA256
c4af2eb6696cbbeef196266da22b17a6ea46ded86cd271fa6422e77d1f6f33d1
-
SHA512
af7e2330b0107ad9a8d21a4974cf577258474378cccfa0ca269679e34b802a1e4c104de10e9e4469bc2c92584a0b646e5fe3393387655f1b1ade02f271d483a2
-
SSDEEP
49152:qvWI22SsaNYfdPBldt698dBcjHlhOEEfsLk/HYXoGd7THHB72eh2NT:qv722SsaNYfdPBldt6+dBcjHlhOHg
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-