General
-
Target
99.exe
-
Size
3.1MB
-
Sample
241025-a7ldtazdmr
-
MD5
4d354ddf83547df347c249ee10a01c6d
-
SHA1
bf1230df5257ba1db8ab7fbf357f01f545e999a2
-
SHA256
dbd3b7317e7aeab2a126c46a2b688c7a68fcc0e1d8f5ed7e011dd3eca80cc50c
-
SHA512
91771ab55252bf6edebe418d25bde4211302414d50303bb466b9dc1ec572f1b44fcb7ca0f16b48710165c0a6349cb653e795ade58ae9b168413f5ef82308e395
-
SSDEEP
49152:6vBt62XlaSFNWPjljiFa2RoUYIyD6x1JBLaGd1THHB72eh2NT:6vr62XlaSFNWPjljiFXRoUYIyD6r
Behavioral task
behavioral1
Sample
99.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
2.tcp.us-cal-1.ngrok.io:14537
0f60b981-1a45-472b-acf2-32d2fa49956b
-
encryption_key
B3CE4ADBCFC896D87D5632035EB0E3D075AB14F9
-
install_name
LOGI_INT.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
LOGI_INT
-
subdirectory
SubDir
Targets
-
-
Target
99.exe
-
Size
3.1MB
-
MD5
4d354ddf83547df347c249ee10a01c6d
-
SHA1
bf1230df5257ba1db8ab7fbf357f01f545e999a2
-
SHA256
dbd3b7317e7aeab2a126c46a2b688c7a68fcc0e1d8f5ed7e011dd3eca80cc50c
-
SHA512
91771ab55252bf6edebe418d25bde4211302414d50303bb466b9dc1ec572f1b44fcb7ca0f16b48710165c0a6349cb653e795ade58ae9b168413f5ef82308e395
-
SSDEEP
49152:6vBt62XlaSFNWPjljiFa2RoUYIyD6x1JBLaGd1THHB72eh2NT:6vr62XlaSFNWPjljiFXRoUYIyD6r
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-