General
-
Target
EyeClient.exe
-
Size
3.1MB
-
Sample
240619-ysy85aterj
-
MD5
bbf7697cee74e2d6b00acc5739105667
-
SHA1
ace762efcbcd1e42b3dcffa9220e179bd0b230bc
-
SHA256
30c86bcef0d8f89c8eae6d18d179726a8d8aef19650e93ff842541833a276681
-
SHA512
fb9e575ce7d306d5bb650d330eb93297581fc648165301a444fb9c1952992081cfb95bcc3e0884b7703c8574b39d363df5ff75a492fe7fb526e8a62b02d49d0e
-
SSDEEP
49152:dsS4wA2Glaq5+RPelPedKukZ2Ur16XucaXBd6oGdkTHHB72eh2NT:dsWA2Glaq5+RPelPed3kZ2Ur16X3
Behavioral task
behavioral1
Sample
EyeClient.exe
Resource
win7-20240508-en
Malware Config
Extracted
quasar
1.4.1
Eyewalled
147.185.221.18:18043
147.185.221.18:1358
a3d2b6d9-f229-4f07-a990-dabdf6a10cde
-
encryption_key
C3103FD765C0AA985FB78C6E1C9F042F8C43DE26
-
install_name
Client.exe
-
log_directory
Client
-
reconnect_delay
3001
-
startup_key
Github.git
-
subdirectory
Management
Targets
-
-
Target
EyeClient.exe
-
Size
3.1MB
-
MD5
bbf7697cee74e2d6b00acc5739105667
-
SHA1
ace762efcbcd1e42b3dcffa9220e179bd0b230bc
-
SHA256
30c86bcef0d8f89c8eae6d18d179726a8d8aef19650e93ff842541833a276681
-
SHA512
fb9e575ce7d306d5bb650d330eb93297581fc648165301a444fb9c1952992081cfb95bcc3e0884b7703c8574b39d363df5ff75a492fe7fb526e8a62b02d49d0e
-
SSDEEP
49152:dsS4wA2Glaq5+RPelPedKukZ2Ur16XucaXBd6oGdkTHHB72eh2NT:dsWA2Glaq5+RPelPed3kZ2Ur16X3
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-