General
-
Target
4ebd63449193b8fdbd0c0315f8e33e10N.exe
-
Size
2.9MB
-
Sample
240722-dh2w2syapk
-
MD5
4ebd63449193b8fdbd0c0315f8e33e10
-
SHA1
31d7b7aee638dfdbfb2e2f009d27ad30637f5953
-
SHA256
7d21bbbcb3e0f709dd351c1edc4d52efae8da0edf341121c17a6cfb1a9ecc7b2
-
SHA512
354555aa35ebb991302e12c36d1698646d7fcbbad8b6e77eda7255a0c7db4447c2d9bfb8a5669d1e93ba76f14624934646bcb2517c7a45a6ce051519371cf3e8
-
SSDEEP
49152:yPXGSVuFey6JK1TGcbEtiAobDv4Rza32ehyfT:yPXdw6JkTGcbEEA
Behavioral task
behavioral1
Sample
4ebd63449193b8fdbd0c0315f8e33e10N.exe
Resource
win7-20240705-en
Malware Config
Extracted
quasar
1.4.0
Proxy
45.66.231.154:45764
80038a66-0dbb-4135-8eb1-4ce5a34ce41b
-
encryption_key
2AA07B1B146EEAF9933214208B2004177FE4FA46
-
install_name
svchost.exe
-
log_directory
svchostetw
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
Microsoft Windows
Targets
-
-
Target
4ebd63449193b8fdbd0c0315f8e33e10N.exe
-
Size
2.9MB
-
MD5
4ebd63449193b8fdbd0c0315f8e33e10
-
SHA1
31d7b7aee638dfdbfb2e2f009d27ad30637f5953
-
SHA256
7d21bbbcb3e0f709dd351c1edc4d52efae8da0edf341121c17a6cfb1a9ecc7b2
-
SHA512
354555aa35ebb991302e12c36d1698646d7fcbbad8b6e77eda7255a0c7db4447c2d9bfb8a5669d1e93ba76f14624934646bcb2517c7a45a6ce051519371cf3e8
-
SSDEEP
49152:yPXGSVuFey6JK1TGcbEtiAobDv4Rza32ehyfT:yPXdw6JkTGcbEEA
-
Quasar payload
-
Executes dropped EXE
-