General
-
Target
b8d24236cb542dd0358707623e485d1f8f5b917103f88e7de9d81356a8bd0a62
-
Size
3.1MB
-
Sample
240731-3gh5zstfnc
-
MD5
7c57eda4bef5b6a6f5ca084dde31deb7
-
SHA1
8ed5f1f48691e8d3d5e910b1fd46d0ce0d30eb1e
-
SHA256
b8d24236cb542dd0358707623e485d1f8f5b917103f88e7de9d81356a8bd0a62
-
SHA512
22d5be1c470f673b7a89ccb972c9b907eb76a070246d071550d891d52d2e4eba2a14df6924b98e1d866ad216e02e3a7cc368f545a578dfe6eaffec461abefe5d
-
SSDEEP
49152:ivjI22SsaNYfdPBldt698dBcjHHAek9hBvJGLoGdkTHHB72eh2NT:ivc22SsaNYfdPBldt6+dBcjH2h8
Behavioral task
behavioral1
Sample
b8d24236cb542dd0358707623e485d1f8f5b917103f88e7de9d81356a8bd0a62.exe
Resource
win7-20240708-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.28:4782
180b92ba-98f1-484b-b54f-264758c8d7f4
-
encryption_key
E2AD968D101B25448614267CCA174D53CE1050BA
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
BootstrapperV1.11
-
subdirectory
SubDir
Targets
-
-
Target
b8d24236cb542dd0358707623e485d1f8f5b917103f88e7de9d81356a8bd0a62
-
Size
3.1MB
-
MD5
7c57eda4bef5b6a6f5ca084dde31deb7
-
SHA1
8ed5f1f48691e8d3d5e910b1fd46d0ce0d30eb1e
-
SHA256
b8d24236cb542dd0358707623e485d1f8f5b917103f88e7de9d81356a8bd0a62
-
SHA512
22d5be1c470f673b7a89ccb972c9b907eb76a070246d071550d891d52d2e4eba2a14df6924b98e1d866ad216e02e3a7cc368f545a578dfe6eaffec461abefe5d
-
SSDEEP
49152:ivjI22SsaNYfdPBldt698dBcjHHAek9hBvJGLoGdkTHHB72eh2NT:ivc22SsaNYfdPBldt6+dBcjH2h8
-
Quasar payload
-
Executes dropped EXE
-