General
-
Target
059de2d5dad8f527afdd419a0593815b.bin
-
Size
1.1MB
-
Sample
241021-bczhmazgqg
-
MD5
d7d74e874e9850412ca5345ad44d50b4
-
SHA1
c40a458f358315352d6bb57d7788f86e054e39f0
-
SHA256
ccbbbf84de0ce4545715cfec71773049c7595690c76fde6f76c581d7307978a6
-
SHA512
695ced83691b1d02c53bf23bfb81cf48052a638ae233a82e36a264693c57f88bd3e03a475b471d447a66ba80cbb75ccf66feb7e6f0492a479c0029fcb96d7197
-
SSDEEP
24576:WoUP4/cyEfI1sPPWCD8pa3I6fc6oh4uh4VDZVdyLGt/wlxbri8B4:WoUP4/m2kZV4x3M1Tsy
Behavioral task
behavioral1
Sample
System.exe
Resource
win7-20240729-en
Malware Config
Extracted
quasar
1.4.1
Office04
adnan1453.duckdns.org:7000
5dc678e1-94c3-4678-929d-93496063af39
-
encryption_key
3A59215E830DCED5E8B222D0893FB53E5581C45B
-
install_name
System.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System
-
subdirectory
SubDir
Targets
-
-
Target
System.exe
-
Size
3.1MB
-
MD5
fed9a2c4913364c73e04d7a2e818e5b0
-
SHA1
20cd6c16f76950da6cff2d638360cc4dd1959b96
-
SHA256
f6de94ee28d98ffb171eca1c8716b4577a3546bac44e41596fe5e1c84d8970bd
-
SHA512
1484733be349db43da7eba830e130b9f3c1071982ba128536c0920eaa491339bfa30c7659a8de41c4696c784d195123d966fc1542370f831cf593dde7c7b5ffe
-
SSDEEP
49152:Wvht62XlaSFNWPjljiFa2RoUYIICh1JeLoGd2eTHHB72eh2NT:WvL62XlaSFNWPjljiFXRoUYIICi
-
Quasar payload
-
Executes dropped EXE
-