General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
241018-ag51javbnf
-
MD5
93a06b7bcf117ab4bde8b9daa3942003
-
SHA1
35d8cdf4afcb3e23604bd4296ca1411764b9f8ca
-
SHA256
c94529f9c134df73528df4cc88b8094a75362044a3f292fbaf2097fec2867784
-
SHA512
e5dd2c62732778087c295d6e73dcaa5dbed26ee2dc41d83f68ea0fc28529a26e896c1be7d185c77c4b7c8f0b37787d5e5051b7d0878dcc91a57aaa93bc8105a4
-
SSDEEP
49152:kYBxoUeW5J4/09qbSl7pHDUQBEx6LoGVP4THHB72eh2NT:kYzoUHv4/09qbSl7pHDUQBEx0L
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.4.1
Office04
Name123forreal-31171.portmap.host:31171
f9634259-eba6-40ac-8644-2c8e433257e9
-
encryption_key
5FD1DA98B24B21C2214C328FD3F0A48F15BBCD2B
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Window Defender Startup
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
93a06b7bcf117ab4bde8b9daa3942003
-
SHA1
35d8cdf4afcb3e23604bd4296ca1411764b9f8ca
-
SHA256
c94529f9c134df73528df4cc88b8094a75362044a3f292fbaf2097fec2867784
-
SHA512
e5dd2c62732778087c295d6e73dcaa5dbed26ee2dc41d83f68ea0fc28529a26e896c1be7d185c77c4b7c8f0b37787d5e5051b7d0878dcc91a57aaa93bc8105a4
-
SSDEEP
49152:kYBxoUeW5J4/09qbSl7pHDUQBEx6LoGVP4THHB72eh2NT:kYzoUHv4/09qbSl7pHDUQBEx0L
-
Quasar payload
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-