General
-
Target
Apex-ghostware-apex-hacks.zip
-
Size
1.2MB
-
Sample
240618-3l3eesyhkb
-
MD5
69502b41497a8b16bcf388228b75adb8
-
SHA1
d9953fe774ddb6a31a5cf6e744a8988ce029db50
-
SHA256
d301b1fa43c202b4bcb45eb25aa8664d2d8f99fa2be9c410cdbbf2b6b8e8bdba
-
SHA512
c74dc0ce190ce7aa566aea95984cf7043d9140839d948f9b15073f63d30298b08363efe1d85504dd6a990bf9af7a2df61c4a898f2bfeee0937a1161e8bfed06a
-
SSDEEP
24576:EcZxtAClBDc2rkW7ERjs37nl08X6JA6efqDnj4KDK7KCKx2vkl9TD3T9R:EcZEYlQnjs7l0jJA6efqDnj7L9ov+9xR
Behavioral task
behavioral1
Sample
Apex-ghostware-apex-hacks.zip
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Apex-ghostware-apex-hacks.zip
Resource
win10v2004-20240611-en
Malware Config
Extracted
quasar
1.4.1
ApexV1
174.175.46.53:1048
c8ba5d8f-6f83-4ae3-ae6c-d1a644d2c509
-
encryption_key
B0ABE169C55CFD4C2E8310DB36202EAF0E98D48D
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
1500
-
startup_key
Windows Updater Service
-
subdirectory
SubDir
Targets
-
-
Target
Apex-ghostware-apex-hacks.zip
-
Size
1.2MB
-
MD5
69502b41497a8b16bcf388228b75adb8
-
SHA1
d9953fe774ddb6a31a5cf6e744a8988ce029db50
-
SHA256
d301b1fa43c202b4bcb45eb25aa8664d2d8f99fa2be9c410cdbbf2b6b8e8bdba
-
SHA512
c74dc0ce190ce7aa566aea95984cf7043d9140839d948f9b15073f63d30298b08363efe1d85504dd6a990bf9af7a2df61c4a898f2bfeee0937a1161e8bfed06a
-
SSDEEP
24576:EcZxtAClBDc2rkW7ERjs37nl08X6JA6efqDnj4KDK7KCKx2vkl9TD3T9R:EcZEYlQnjs7l0jJA6efqDnj7L9ov+9xR
-
Quasar payload
-
Executes dropped EXE
-