General
-
Target
eez.exe
-
Size
626KB
-
Sample
240626-whltyavhkf
-
MD5
ab1bf1d9b15ad029153bc655e93563f9
-
SHA1
a5666f96fa86668c5074421ff07046060412a232
-
SHA256
07fc41a684f289e5b0675570db4d99dbd14d19ddc72fe047ba431d356440d020
-
SHA512
e5701265a584b58f3a182c6e1fadf53ac46907015519d774017e3c2f34d173d9a57a08f82e2415dac5b96c94b042491320a4390e3c252ffdb636344ab11ab61b
-
SSDEEP
12288:H3z4vXeY9iZ5Y2vTuqRxHAIhCrLALSX9WOp34LcnqaVmhw5L:HE/H9I/BR+IhCrL0KAQtVmWL
Static task
static1
Behavioral task
behavioral1
Sample
eez.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
1.4.0.0
test
134.122.3.3:8888
OzdeExqz2V6HvarCjO
-
encryption_key
s0s5WZZZhj89XUw4wCHL
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
eez.exe
-
Size
626KB
-
MD5
ab1bf1d9b15ad029153bc655e93563f9
-
SHA1
a5666f96fa86668c5074421ff07046060412a232
-
SHA256
07fc41a684f289e5b0675570db4d99dbd14d19ddc72fe047ba431d356440d020
-
SHA512
e5701265a584b58f3a182c6e1fadf53ac46907015519d774017e3c2f34d173d9a57a08f82e2415dac5b96c94b042491320a4390e3c252ffdb636344ab11ab61b
-
SSDEEP
12288:H3z4vXeY9iZ5Y2vTuqRxHAIhCrLALSX9WOp34LcnqaVmhw5L:HE/H9I/BR+IhCrL0KAQtVmWL
-
Quasar payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-