General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
240817-jbsyfsxdpr
-
MD5
6163ff7c7b7268a913236d8dd1f54ae0
-
SHA1
ea98f306cdba4530432eb95066a5a32dbdea8cd7
-
SHA256
84d0605cf5fa762749ee8066956bf7f56eccbc37593fc80810f6cef082043ab0
-
SHA512
f48e018bafac40e469ed58e9667e5f59face989fc4503e5e6d4177a53438c9a2c6778279f720e2b40a3653114d648d39bceb3a4b50923e76c238248d403cdb42
-
SSDEEP
49152:Uh/CvvE+8hJIKxIVt7PqFYxEsxuGI2jZTHHB72eh2NTU:UhqE+8hJIKxIVt79Esx/X
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240729-en
Malware Config
Extracted
quasar
1.4.1
SKIDS
147.185.221.22:6712
545189bc-dfba-489d-8e50-a0af024c11bf
-
encryption_key
9E968F05BD874BA1BE086FD1774A027473823F49
-
install_name
Windows Host Process.exe
-
log_directory
Windows-Logs
-
reconnect_delay
3000
-
startup_key
Windows Host Process
-
subdirectory
Windows
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
6163ff7c7b7268a913236d8dd1f54ae0
-
SHA1
ea98f306cdba4530432eb95066a5a32dbdea8cd7
-
SHA256
84d0605cf5fa762749ee8066956bf7f56eccbc37593fc80810f6cef082043ab0
-
SHA512
f48e018bafac40e469ed58e9667e5f59face989fc4503e5e6d4177a53438c9a2c6778279f720e2b40a3653114d648d39bceb3a4b50923e76c238248d403cdb42
-
SSDEEP
49152:Uh/CvvE+8hJIKxIVt7PqFYxEsxuGI2jZTHHB72eh2NTU:UhqE+8hJIKxIVt79Esx/X
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-