Resubmissions
30-10-2024 11:53
241030-n2cflstqfl 10General
-
Target
rezprivwoofer.7z
-
Size
922KB
-
Sample
241030-n2cflstqfl
-
MD5
ce9fffb471e829d7699de686effc9da9
-
SHA1
02e1a328bd7f7fbca2d10262d41c990c23bdc7e3
-
SHA256
6be1cae3cc032014e34c3a79e24aafd051639b807db79ea56d493d9203c2ac89
-
SHA512
b5bb21080c465a8c2ee24e8e83f274d95793932243465ffd7e4fdee5d34430039a81e70494bdd0f575ba5e1405fc62b01dfd4eb0a2a2cd101559c91c7e6c8204
-
SSDEEP
24576:z8rEMh0iV0E7rx/oK4e4lPlpgZq5hG9bLMk:z84MJ0E7rx/B8BbgZq5hYLr
Behavioral task
behavioral1
Sample
rezprivwoofer/TempWoofpriv.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.28:4782
d77230bf-9913-4330-a1f9-b2094453e604
-
encryption_key
954674A032C3A24E1CEB078DEAC16D915B41486D
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
rezprivwoofer/TempWoofpriv.exe
-
Size
3.1MB
-
MD5
b9aee7a92f002f80a6b04c252b05bb29
-
SHA1
4e186ba6d401d5e45627ac789d3cf22d19698b8c
-
SHA256
72f27c509e27de2edbe9d98fa9258624260d3cabd7b9932636dceb610180d7ef
-
SHA512
b3f899e279c6f72cb8517160b747bcd44339909b61a82e4304d1e29e9e5da9506acdde8531d25ed3a3506781743c74427437dcfc6981bc992fdb5d83652cb6cd
-
SSDEEP
49152:6vWI22SsaNYfdPBldt698dBcjHRwn85kbRULoGdWiTHHB72eh2NT:6v722SsaNYfdPBldt6+dBcjHRwn85XG
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-