General
-
Target
DDOS MACHINE.exe
-
Size
3.1MB
-
Sample
240723-zvczcaycjr
-
MD5
9ae854a885e4698de5e4cca377dfe7d4
-
SHA1
599cbf8945c67bbdacc0e8c9dffdd09db9b76af8
-
SHA256
bc308a0c58243b24782c5087caed3326fcb67561a4073adb4107b6f9cbee99f7
-
SHA512
1a08452fa94989b0c61b62054492e2511f5fe920093e2854eb815210936870cd3cf66acf4ba21dd1543b664d969c9721a6c50d930aa8bb6a6abbacffd8e27248
-
SSDEEP
49152:evLY52fyaSZOrPWluWBuGG5g5hlTy3EfsGk/WPJoGdVTHHB72eh2NT:evs52fyaSZOrPWluWBDG5g5hlTysR
Behavioral task
behavioral1
Sample
DDOS MACHINE.exe
Resource
win7-20240704-en
Malware Config
Extracted
quasar
1.4.1
Office04
siig:4782
bfc70cfc-e322-441b-a771-4338fcf604af
-
encryption_key
41575D4A93D1D340B16DEDC351DFE0FF85A5C830
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java Updater
-
subdirectory
SubDir
Targets
-
-
Target
DDOS MACHINE.exe
-
Size
3.1MB
-
MD5
9ae854a885e4698de5e4cca377dfe7d4
-
SHA1
599cbf8945c67bbdacc0e8c9dffdd09db9b76af8
-
SHA256
bc308a0c58243b24782c5087caed3326fcb67561a4073adb4107b6f9cbee99f7
-
SHA512
1a08452fa94989b0c61b62054492e2511f5fe920093e2854eb815210936870cd3cf66acf4ba21dd1543b664d969c9721a6c50d930aa8bb6a6abbacffd8e27248
-
SSDEEP
49152:evLY52fyaSZOrPWluWBuGG5g5hlTy3EfsGk/WPJoGdVTHHB72eh2NT:evs52fyaSZOrPWluWBDG5g5hlTysR
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-