General
-
Target
7u45745967.exe
-
Size
3.1MB
-
Sample
241024-agtbqsvhra
-
MD5
dadd4502cec83146bc01bd9e01e9e4ad
-
SHA1
c7c7def14dd5f15e92a4227be4c5ad3af175a2ca
-
SHA256
0f89689dce10772f4f7ad3c2431ec808fd53a40a93314a2a22ef1b63eb21b37b
-
SHA512
4d25597282663c033eadafc755ad2e1f6c6700a601ea0f64f7a8922c41be2aeba3f3d5479a904ed0461ad51ffc3256963b0fbb5c9f8b366a94767b218ef08f8f
-
SSDEEP
49152:GvBt62XlaSFNWPjljiFa2RoUYIioxNESEek/isLoGdI5THHB72eh2NT:Gvr62XlaSFNWPjljiFXRoUYINx1y
Behavioral task
behavioral1
Sample
7u45745967.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
4.tcp.us-cal-1.ngrok.io:11073
5ef8baaf-b402-47aa-8c01-abb78e86878b
-
encryption_key
64E5F426F36D28C0743F6DA157D86F7805E54413
-
install_name
LOGI_INT.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
LOGI_INT
-
subdirectory
SubDir
Targets
-
-
Target
7u45745967.exe
-
Size
3.1MB
-
MD5
dadd4502cec83146bc01bd9e01e9e4ad
-
SHA1
c7c7def14dd5f15e92a4227be4c5ad3af175a2ca
-
SHA256
0f89689dce10772f4f7ad3c2431ec808fd53a40a93314a2a22ef1b63eb21b37b
-
SHA512
4d25597282663c033eadafc755ad2e1f6c6700a601ea0f64f7a8922c41be2aeba3f3d5479a904ed0461ad51ffc3256963b0fbb5c9f8b366a94767b218ef08f8f
-
SSDEEP
49152:GvBt62XlaSFNWPjljiFa2RoUYIioxNESEek/isLoGdI5THHB72eh2NT:Gvr62XlaSFNWPjljiFXRoUYINx1y
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-