General
-
Target
11.exe
-
Size
3.1MB
-
Sample
241025-bk8q9szhnp
-
MD5
c93d94b0a449844d3667b6010fe5aade
-
SHA1
13b8c92ee9a65b38cde39ad57c2831f94ea6e276
-
SHA256
28db0254d5d08b04428d539f75e6f4768a708cb87967a400fbdcc93666feb902
-
SHA512
e6c69095747cac933c6738ec11e6dec371a949f26cbfb4ca80091e03d92d039c037dc26136321bde5781636dab6780b7b5f428ab6fc87760b365f1853e71831b
-
SSDEEP
49152:PvAt62XlaSFNWPjljiFa2RoUYIMckP8yK3oGdDoTHHB72eh2NT:Pvs62XlaSFNWPjljiFXRoUYIMckO
Behavioral task
behavioral1
Sample
11.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
2.tcp.us-cal-1.ngrok.io:12557
0562a50f-52b7-4929-bdf5-c357a23b94cf
-
encryption_key
08AB3752308D3103CD53B7F871667B69AEA33E27
-
install_name
LOGI_INT.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
LOGI_INT
-
subdirectory
SubDir
Targets
-
-
Target
11.exe
-
Size
3.1MB
-
MD5
c93d94b0a449844d3667b6010fe5aade
-
SHA1
13b8c92ee9a65b38cde39ad57c2831f94ea6e276
-
SHA256
28db0254d5d08b04428d539f75e6f4768a708cb87967a400fbdcc93666feb902
-
SHA512
e6c69095747cac933c6738ec11e6dec371a949f26cbfb4ca80091e03d92d039c037dc26136321bde5781636dab6780b7b5f428ab6fc87760b365f1853e71831b
-
SSDEEP
49152:PvAt62XlaSFNWPjljiFa2RoUYIMckP8yK3oGdDoTHHB72eh2NT:Pvs62XlaSFNWPjljiFXRoUYIMckO
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-