General
-
Target
Client-built.exe
-
Size
348KB
-
Sample
240727-hsamrswckc
-
MD5
d2496f14981deb0d0524e144e4ed5d01
-
SHA1
6cf4b72841078e0ec09fc065dafb0973f235bfe3
-
SHA256
6fc60e8daa45260a213e99cdf49670bb13e750f1ddef2ac95dbd52029474d280
-
SHA512
11b95f16296a9261f2efbf09b563651fc47ee0c957350858e40594acc84bc37dcff688c77ffd0ddfcdbfad2e1014e3295e106d8248febaa2d6ee38cc98b4bcaa
-
SSDEEP
6144:DKznJgE02p2sg/d9btmdcF7nvmG0qqlw:m2v2pUIcFjvR0plw
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240704-en
Malware Config
Extracted
quasar
1.3.0.0
Office04
thus-coffee.gl.at.ply.gg:6886
thus-coffee.gl.at.ply.gg:7385
QSR_MUTEX_NjEV0AlbOQ1YYhXJJT
-
encryption_key
V8y9QjEQpQUAITBqQ54x
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
update
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
348KB
-
MD5
d2496f14981deb0d0524e144e4ed5d01
-
SHA1
6cf4b72841078e0ec09fc065dafb0973f235bfe3
-
SHA256
6fc60e8daa45260a213e99cdf49670bb13e750f1ddef2ac95dbd52029474d280
-
SHA512
11b95f16296a9261f2efbf09b563651fc47ee0c957350858e40594acc84bc37dcff688c77ffd0ddfcdbfad2e1014e3295e106d8248febaa2d6ee38cc98b4bcaa
-
SSDEEP
6144:DKznJgE02p2sg/d9btmdcF7nvmG0qqlw:m2v2pUIcFjvR0plw
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-