General
-
Target
PermWoofer.exe
-
Size
3.1MB
-
Sample
241029-3erz4ssakh
-
MD5
b4ac68d3c6cc89ae97e519b9a7241bba
-
SHA1
ced8a4dec2238bc5f2b7ca9ef9fdac0a6cd9108f
-
SHA256
03bc2c340a1081e1521a5c4b92c38756f4de234ac1b1a578556d83737972e343
-
SHA512
8870741c08574945ea43055e6031394af96290348e4e55d3570f937020c49020fc7d61517d9ab9dd42fc65066ba113cb8a31f2d45cff7f7301f8e865d52aa1d5
-
SSDEEP
49152:Kvkt62XlaSFNWPjljiFa2RoUYIibRJ60bR3LoGdjTHHB72eh2NT:Kv462XlaSFNWPjljiFXRoUYIibRJ6+
Behavioral task
behavioral1
Sample
PermWoofer.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.28:4782
03ef2b9a-5389-4312-b3d3-9b6f68cc5386
-
encryption_key
F8A900CD75D848E74023B3A66FA8AA5469C97692
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
ahhaa
-
subdirectory
SubDir
Targets
-
-
Target
PermWoofer.exe
-
Size
3.1MB
-
MD5
b4ac68d3c6cc89ae97e519b9a7241bba
-
SHA1
ced8a4dec2238bc5f2b7ca9ef9fdac0a6cd9108f
-
SHA256
03bc2c340a1081e1521a5c4b92c38756f4de234ac1b1a578556d83737972e343
-
SHA512
8870741c08574945ea43055e6031394af96290348e4e55d3570f937020c49020fc7d61517d9ab9dd42fc65066ba113cb8a31f2d45cff7f7301f8e865d52aa1d5
-
SSDEEP
49152:Kvkt62XlaSFNWPjljiFa2RoUYIibRJ60bR3LoGdjTHHB72eh2NT:Kv462XlaSFNWPjljiFXRoUYIibRJ6+
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-