General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
241013-1m318szgpa
-
MD5
7bb67714c33aa3dc9fe346b859d3ffd8
-
SHA1
686b76ded3573663ad629ce10ff3e8afa3545b07
-
SHA256
723d899faef9b66d299b81d62e4962ce9168d4df373ef25ea0cd95fd59a2fa70
-
SHA512
33872042221e5e339703c07252f66e7329eec2fcbbc03f52d78dae4d14229a6982856ef1f3a96ee0722aa3d69a24f30a4e29143f84de09383290bd32cb599090
-
SSDEEP
49152:GvHI22SsaNYfdPBldt698dBcjHUCYa95fQFk/VLoGds4THHB72eh2NT:Gvo22SsaNYfdPBldt6+dBcjH2af
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
165.227.31.192:22088
111510af-51e9-4206-84d6-4a8308fcde0b
-
encryption_key
58663523DF152C6BB3C05371B4C69BB5A1242833
-
install_name
WindowsSubSystemForAndroid.exe
-
log_directory
Logger
-
reconnect_delay
3000
-
startup_key
WSL Startup
-
subdirectory
Roaming
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
7bb67714c33aa3dc9fe346b859d3ffd8
-
SHA1
686b76ded3573663ad629ce10ff3e8afa3545b07
-
SHA256
723d899faef9b66d299b81d62e4962ce9168d4df373ef25ea0cd95fd59a2fa70
-
SHA512
33872042221e5e339703c07252f66e7329eec2fcbbc03f52d78dae4d14229a6982856ef1f3a96ee0722aa3d69a24f30a4e29143f84de09383290bd32cb599090
-
SSDEEP
49152:GvHI22SsaNYfdPBldt698dBcjHUCYa95fQFk/VLoGds4THHB72eh2NT:Gvo22SsaNYfdPBldt6+dBcjH2af
-
Quasar payload
-
Executes dropped EXE
-