General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
241020-cmpa3sshla
-
MD5
f2d7f59c276231747caccd70bf574f01
-
SHA1
7a94a716a5726d10e5559fa614e6bb6e87e26aa1
-
SHA256
154f3bb6d0872d339a2625f7a2cf0dc4f96d85aa94d4f76c4c76f3d81a37d19d
-
SHA512
c8d635d95b796c2f480659429e34530e660e7dab67b3f99788508540972294731963129919967a25ba49d664034c341030309a7cb4c7fc00ffd01504e25abc46
-
SSDEEP
49152:/ZGG1LyJ9qP/u0F+F1nqJ3F9j9F7w49WoAVBTHHB72eh2NT:/ZG/Jw20F+F1nqJ3F9T7wn
Malware Config
Extracted
quasar
1.0.0
Office04
Name123forreal-22013.portmap.host:22013
f9634259-eba6-40ac-8644-2c8e433257e9
-
encryption_key
5FD1DA98B24B21C2214C328FD3F0A48F15BBCD2B
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Window Defender Startup
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
f2d7f59c276231747caccd70bf574f01
-
SHA1
7a94a716a5726d10e5559fa614e6bb6e87e26aa1
-
SHA256
154f3bb6d0872d339a2625f7a2cf0dc4f96d85aa94d4f76c4c76f3d81a37d19d
-
SHA512
c8d635d95b796c2f480659429e34530e660e7dab67b3f99788508540972294731963129919967a25ba49d664034c341030309a7cb4c7fc00ffd01504e25abc46
-
SSDEEP
49152:/ZGG1LyJ9qP/u0F+F1nqJ3F9j9F7w49WoAVBTHHB72eh2NT:/ZG/Jw20F+F1nqJ3F9T7wn
-
Quasar payload
-
Executes dropped EXE
-