General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
240716-k249vaxfjh
-
MD5
d9a4c8f06b7b0426d6e67a43ddb5b118
-
SHA1
8bd62ef23e1de76f9b0a09a6168af0037bef8026
-
SHA256
dd3a0e96a5f0c33c48c6ff2147abf15e6be49172e7bf6c582005331224c59fda
-
SHA512
ea6fb24eb746a6fdb4be2e38a193ae221a86454d999ecd24cd9500041ac1774f8e38275199c02979079baa94b840669617138c36b9965a8f61406e98ea8faedb
-
SSDEEP
49152:uvkt62XlaSFNWPjljiFa2RoUYIyzhkbRjPLoGdCTHHB72eh2NT:uv462XlaSFNWPjljiFXRoUYIyzhsT
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.112.130:4444
524f4736-b434-4f1b-87d4-60efee95f1a0
-
encryption_key
FD2C72B7511C4796A615A71C40CAA513DD1F1A24
-
install_name
Byfron.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Byfron
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
d9a4c8f06b7b0426d6e67a43ddb5b118
-
SHA1
8bd62ef23e1de76f9b0a09a6168af0037bef8026
-
SHA256
dd3a0e96a5f0c33c48c6ff2147abf15e6be49172e7bf6c582005331224c59fda
-
SHA512
ea6fb24eb746a6fdb4be2e38a193ae221a86454d999ecd24cd9500041ac1774f8e38275199c02979079baa94b840669617138c36b9965a8f61406e98ea8faedb
-
SSDEEP
49152:uvkt62XlaSFNWPjljiFa2RoUYIyzhkbRjPLoGdCTHHB72eh2NT:uv462XlaSFNWPjljiFXRoUYIyzhsT
-
Quasar payload
-
Executes dropped EXE
-