General
-
Target
6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd
-
Size
3.1MB
-
Sample
241031-awqjdsvgmj
-
MD5
8e2f41a8da48ee3bb6d533d7de12d621
-
SHA1
4b4f1bbfc8e8570668b55f1157791879fc272a6b
-
SHA256
6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd
-
SHA512
fb78fabf6e4b4e52b375f63b687ea6758efa05a7a1b67c2df5c18cdbb9382bb34f768d340cb8386432a8b52fc7893d807409dd4857c3f46cdec54bc5745224d0
-
SSDEEP
49152:CvyI22SsaNYfdPBldt698dBcjHmIxNESEHk/inLoGdxTHHB72eh2NT:Cvf22SsaNYfdPBldt6+dBcjHdxWL
Behavioral task
behavioral1
Sample
6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.116:4782
7bcc4347-f38d-44cb-b66e-2a087c7e915f
-
encryption_key
84ADCD6EA0C9BEC44FAF54AEA226EC9015B89296
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Services
-
subdirectory
SubDir
Targets
-
-
Target
6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd
-
Size
3.1MB
-
MD5
8e2f41a8da48ee3bb6d533d7de12d621
-
SHA1
4b4f1bbfc8e8570668b55f1157791879fc272a6b
-
SHA256
6c05bdd9bfaaab482d1261c53bd31ec000b9c6a401e8a9f40684217d4c3805cd
-
SHA512
fb78fabf6e4b4e52b375f63b687ea6758efa05a7a1b67c2df5c18cdbb9382bb34f768d340cb8386432a8b52fc7893d807409dd4857c3f46cdec54bc5745224d0
-
SSDEEP
49152:CvyI22SsaNYfdPBldt698dBcjHmIxNESEHk/inLoGdxTHHB72eh2NT:Cvf22SsaNYfdPBldt6+dBcjHdxWL
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-