General
-
Target
fcb3dff30df407b61463dddbeb990fe7f4f78b41e6f43915325f4b78ab69f34d.zip
-
Size
1.2MB
-
Sample
241020-dr5paswcja
-
MD5
059de2d5dad8f527afdd419a0593815b
-
SHA1
1676bfbb089af9ad7d197b1907c1976c4ee7f02a
-
SHA256
fcb3dff30df407b61463dddbeb990fe7f4f78b41e6f43915325f4b78ab69f34d
-
SHA512
8fa62ff22056efed457423e5c86b1296f765acc8000be7678e3630495b565a4a02bfa9820a375d83b4191b5e86bcd0d13392c4dc501f520312a2473d7f76c61c
-
SSDEEP
24576:Ipf4LgLF1yaPO/M3izsdIk7ydNqJ/slLNXzz6EJavMCpk0z/G:IpfaG1tizMQqJizzCNk0i
Behavioral task
behavioral1
Sample
System.exe
Resource
win7-20240708-en
Malware Config
Extracted
quasar
1.4.1
Office04
adnan1453.duckdns.org:7000
5dc678e1-94c3-4678-929d-93496063af39
-
encryption_key
3A59215E830DCED5E8B222D0893FB53E5581C45B
-
install_name
System.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System
-
subdirectory
SubDir
Targets
-
-
Target
System.exe
-
Size
3.1MB
-
MD5
fed9a2c4913364c73e04d7a2e818e5b0
-
SHA1
20cd6c16f76950da6cff2d638360cc4dd1959b96
-
SHA256
f6de94ee28d98ffb171eca1c8716b4577a3546bac44e41596fe5e1c84d8970bd
-
SHA512
1484733be349db43da7eba830e130b9f3c1071982ba128536c0920eaa491339bfa30c7659a8de41c4696c784d195123d966fc1542370f831cf593dde7c7b5ffe
-
SSDEEP
49152:Wvht62XlaSFNWPjljiFa2RoUYIICh1JeLoGd2eTHHB72eh2NT:WvL62XlaSFNWPjljiFXRoUYIICi
-
Quasar payload
-
Executes dropped EXE
-