General
-
Target
ed098d7dc50ce75bc364fe18d99df66e3761a74f234f4bcf96f2895dd0c1fbc4N
-
Size
3.6MB
-
Sample
241021-ed34zsyerm
-
MD5
eaab27b2ddf8f180a9a39cf41cc315b0
-
SHA1
3911cd0517ffc749813b0d37a24748e1b7f87840
-
SHA256
ed098d7dc50ce75bc364fe18d99df66e3761a74f234f4bcf96f2895dd0c1fbc4
-
SHA512
2aa9745e51b51e613b1e64e21d29beb2a324b53dfff8a3c02952b4c679e392acf43e1b8fa71d427b1105fdd7f6b9067e1c69b477507971d8e89d00b35a32d405
-
SSDEEP
98304:WePiQC7Nny+mfIydB6Yd0dfs+bkhDKN4MyiGny:3PiQkty/ZdB5aJkTny
Static task
static1
Behavioral task
behavioral1
Sample
ed098d7dc50ce75bc364fe18d99df66e3761a74f234f4bcf96f2895dd0c1fbc4N.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
139.99.114.150:4782
5d00609e-0fa1-420e-ae32-932ac5f0d8a0
-
encryption_key
353F228C32E13DAE9184FE5306B840EBAF1CD966
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
ed098d7dc50ce75bc364fe18d99df66e3761a74f234f4bcf96f2895dd0c1fbc4N
-
Size
3.6MB
-
MD5
eaab27b2ddf8f180a9a39cf41cc315b0
-
SHA1
3911cd0517ffc749813b0d37a24748e1b7f87840
-
SHA256
ed098d7dc50ce75bc364fe18d99df66e3761a74f234f4bcf96f2895dd0c1fbc4
-
SHA512
2aa9745e51b51e613b1e64e21d29beb2a324b53dfff8a3c02952b4c679e392acf43e1b8fa71d427b1105fdd7f6b9067e1c69b477507971d8e89d00b35a32d405
-
SSDEEP
98304:WePiQC7Nny+mfIydB6Yd0dfs+bkhDKN4MyiGny:3PiQkty/ZdB5aJkTny
-
Quasar payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-