General
-
Target
BootstrapperV1.11.exe
-
Size
3.1MB
-
Sample
240801-cg372s1ajg
-
MD5
f9da53f4f072c15dbf78b015a10575a2
-
SHA1
96ea78662e9f44d6b4dcbbdc05bb4026188697ff
-
SHA256
dd37983f893fe6aec0c2721e910896122de0549306fbc60277c3adf8a991bd0c
-
SHA512
be39c735e3aa3a361b3ad2fd766182df0fa2dabbb50c3793f8d92d3c5ee1243d0111e2b40f47a2a68ab0a4e107bb50e411281b6d91fb4a17d0dfb8dd761dfa6f
-
SSDEEP
49152:2vHY52fyaSZOrPWluWBuGG5g5hYPV8mC9QoGErqTHHB72eh2NT:2v452fyaSZOrPWluWBDG5g5hYPVBq
Behavioral task
behavioral1
Sample
BootstrapperV1.11.exe
Resource
win7-20240705-en
Malware Config
Extracted
quasar
1.4.1
Office04
10.2.0.2:4782
cc6f57e2-b224-4b7b-bfae-0b1e6f95f22f
-
encryption_key
48E15FD52A3A24CE1F767DA2AD76CB0B862CC879
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Solara
-
subdirectory
SubDir
Targets
-
-
Target
BootstrapperV1.11.exe
-
Size
3.1MB
-
MD5
f9da53f4f072c15dbf78b015a10575a2
-
SHA1
96ea78662e9f44d6b4dcbbdc05bb4026188697ff
-
SHA256
dd37983f893fe6aec0c2721e910896122de0549306fbc60277c3adf8a991bd0c
-
SHA512
be39c735e3aa3a361b3ad2fd766182df0fa2dabbb50c3793f8d92d3c5ee1243d0111e2b40f47a2a68ab0a4e107bb50e411281b6d91fb4a17d0dfb8dd761dfa6f
-
SSDEEP
49152:2vHY52fyaSZOrPWluWBuGG5g5hYPV8mC9QoGErqTHHB72eh2NT:2v452fyaSZOrPWluWBDG5g5hYPVBq
-
Quasar payload
-
Executes dropped EXE
-