General
-
Target
f6de94ee28d98ffb171eca1c8716b4577a3546bac44e41596fe5e1c84d8970bdN
-
Size
3.1MB
-
Sample
241030-mm6kga1hpj
-
MD5
fed9a2c4913364c73e04d7a2e818e5b0
-
SHA1
20cd6c16f76950da6cff2d638360cc4dd1959b96
-
SHA256
f6de94ee28d98ffb171eca1c8716b4577a3546bac44e41596fe5e1c84d8970bd
-
SHA512
1484733be349db43da7eba830e130b9f3c1071982ba128536c0920eaa491339bfa30c7659a8de41c4696c784d195123d966fc1542370f831cf593dde7c7b5ffe
-
SSDEEP
49152:Wvht62XlaSFNWPjljiFa2RoUYIICh1JeLoGd2eTHHB72eh2NT:WvL62XlaSFNWPjljiFXRoUYIICi
Behavioral task
behavioral1
Sample
f6de94ee28d98ffb171eca1c8716b4577a3546bac44e41596fe5e1c84d8970bdN.exe
Resource
win7-20241023-en
Malware Config
Extracted
quasar
1.4.1
Office04
adnan1453.duckdns.org:7000
5dc678e1-94c3-4678-929d-93496063af39
-
encryption_key
3A59215E830DCED5E8B222D0893FB53E5581C45B
-
install_name
System.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System
-
subdirectory
SubDir
Targets
-
-
Target
f6de94ee28d98ffb171eca1c8716b4577a3546bac44e41596fe5e1c84d8970bdN
-
Size
3.1MB
-
MD5
fed9a2c4913364c73e04d7a2e818e5b0
-
SHA1
20cd6c16f76950da6cff2d638360cc4dd1959b96
-
SHA256
f6de94ee28d98ffb171eca1c8716b4577a3546bac44e41596fe5e1c84d8970bd
-
SHA512
1484733be349db43da7eba830e130b9f3c1071982ba128536c0920eaa491339bfa30c7659a8de41c4696c784d195123d966fc1542370f831cf593dde7c7b5ffe
-
SSDEEP
49152:Wvht62XlaSFNWPjljiFa2RoUYIICh1JeLoGd2eTHHB72eh2NT:WvL62XlaSFNWPjljiFXRoUYIICi
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-