General
-
Target
a53732f6b49c8d9b99b7bdad38c3255f7ea944e14b86c8f674dd3187c74e808e.exe
-
Size
348KB
-
Sample
240927-vn3tzasdjr
-
MD5
1e9812a1888c470d13eb21fa9a782277
-
SHA1
567d226e5bb40bec7b3e93a740140df88ecdcd5c
-
SHA256
a53732f6b49c8d9b99b7bdad38c3255f7ea944e14b86c8f674dd3187c74e808e
-
SHA512
6b9c5b38d9a09b63cee437b33611a5fcb4a43b5a56eec693279fac4bd4fef4c1971d2be8cd9b357ed2d2e84ca8b2f4b84876d31ea67c19d3c26dbf8b1e743f47
-
SSDEEP
6144:x7NHXf500MEZXBpc96nbsebHgAA7yITIXE8dWS:Fd50Yc96bMVL2E8AS
Behavioral task
behavioral1
Sample
a53732f6b49c8d9b99b7bdad38c3255f7ea944e14b86c8f674dd3187c74e808e.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.3.0.0
Office04
192.168.234.157:1234
QSR_MUTEX_5bycvm6yUpl1GsdPT8
-
encryption_key
oHEH69w2AAxVFHtx6W9f
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
a53732f6b49c8d9b99b7bdad38c3255f7ea944e14b86c8f674dd3187c74e808e.exe
-
Size
348KB
-
MD5
1e9812a1888c470d13eb21fa9a782277
-
SHA1
567d226e5bb40bec7b3e93a740140df88ecdcd5c
-
SHA256
a53732f6b49c8d9b99b7bdad38c3255f7ea944e14b86c8f674dd3187c74e808e
-
SHA512
6b9c5b38d9a09b63cee437b33611a5fcb4a43b5a56eec693279fac4bd4fef4c1971d2be8cd9b357ed2d2e84ca8b2f4b84876d31ea67c19d3c26dbf8b1e743f47
-
SSDEEP
6144:x7NHXf500MEZXBpc96nbsebHgAA7yITIXE8dWS:Fd50Yc96bMVL2E8AS
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-