General
-
Target
EyeClient.bat
-
Size
1.6MB
-
Sample
240618-3rlnvszajh
-
MD5
14aab9541c84b99b2aa9c6fca75b1293
-
SHA1
7873f0564700a9edeff8773699917aac9e1f37ab
-
SHA256
43d39150b517021802a0c66141d4c433e43ca1c73abe4f16efbfe95d4cfa9735
-
SHA512
1491e2103fd086cd22826bf9294d34dd69b9396326c0675bbb67d683d773a303220d966cafbf964ea0cb8540abb646c38adc4dbe2e67fb55aa03b5d0b1a800ce
-
SSDEEP
24576:7x2aKbzvuTA8Udd82UvNfewSoNE8d3P+Yu+u4gCHydZYzAB5k9pMDi9iKAlpiN:N2Bu5lhD3P3bhUi9RAC
Static task
static1
Behavioral task
behavioral1
Sample
EyeClient.bat
Resource
win7-20240611-en
Malware Config
Extracted
quasar
1.4.1
Eyewalled
147.185.221.18:18043
147.185.221.18:1358
a3d2b6d9-f229-4f07-a990-dabdf6a10cde
-
encryption_key
B3AE4475AF1A6844B3AC5E40D6C3D2D1114C7DFA
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3001
-
startup_key
Github.git
-
subdirectory
Management
Targets
-
-
Target
EyeClient.bat
-
Size
1.6MB
-
MD5
14aab9541c84b99b2aa9c6fca75b1293
-
SHA1
7873f0564700a9edeff8773699917aac9e1f37ab
-
SHA256
43d39150b517021802a0c66141d4c433e43ca1c73abe4f16efbfe95d4cfa9735
-
SHA512
1491e2103fd086cd22826bf9294d34dd69b9396326c0675bbb67d683d773a303220d966cafbf964ea0cb8540abb646c38adc4dbe2e67fb55aa03b5d0b1a800ce
-
SSDEEP
24576:7x2aKbzvuTA8Udd82UvNfewSoNE8d3P+Yu+u4gCHydZYzAB5k9pMDi9iKAlpiN:N2Bu5lhD3P3bhUi9RAC
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-