General
-
Target
5t2363223623312sdsafgdf.exe
-
Size
3.1MB
-
Sample
241024-aj929sxhrl
-
MD5
74fcf7ab924850fe95eed572e75a8e91
-
SHA1
ad8da638e83f9953b74b74b7e0f5cd3fc91b5309
-
SHA256
3a4eaaf270fece850ea5fde3dbb2f9951e67b0651cb7bab1d6fa8c509ee03597
-
SHA512
722cc4c7a8472dd4b8f733b4a5da9a8ffa2af319c673be3f1788307d13ff2c6498c865edac9ddbf21cf500dfcb185e5d6c16c59d0d2d379a3e92b366f06d75f6
-
SSDEEP
49152:+vBt62XlaSFNWPjljiFa2RoUYIwxDE/gHk/JxBoGddOTHHB72eh2NT:+vr62XlaSFNWPjljiFXRoUYIwxQL
Behavioral task
behavioral1
Sample
5t2363223623312sdsafgdf.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
Office04
0.tcp.us-cal-1.ngrok.io:10025
093ad4d0-ac96-49ac-a21d-e2ecfcdc257f
-
encryption_key
64E5F426F36D28C0743F6DA157D86F7805E54413
-
install_name
LOGI_INT.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
LOGI_INT
-
subdirectory
SubDir
Targets
-
-
Target
5t2363223623312sdsafgdf.exe
-
Size
3.1MB
-
MD5
74fcf7ab924850fe95eed572e75a8e91
-
SHA1
ad8da638e83f9953b74b74b7e0f5cd3fc91b5309
-
SHA256
3a4eaaf270fece850ea5fde3dbb2f9951e67b0651cb7bab1d6fa8c509ee03597
-
SHA512
722cc4c7a8472dd4b8f733b4a5da9a8ffa2af319c673be3f1788307d13ff2c6498c865edac9ddbf21cf500dfcb185e5d6c16c59d0d2d379a3e92b366f06d75f6
-
SSDEEP
49152:+vBt62XlaSFNWPjljiFa2RoUYIwxDE/gHk/JxBoGddOTHHB72eh2NT:+vr62XlaSFNWPjljiFXRoUYIwxQL
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-