General
-
Target
CatWare.exe
-
Size
3.1MB
-
Sample
241101-3r14jsxcnl
-
MD5
803cc54f484ecae234df37adb1a297ae
-
SHA1
1562c04da59e2394dc6d253875c34c55b44fb399
-
SHA256
475d80a9c80ae084c34d321bc8d6d97a9ad8394b608f62cfa53e0b0313d6e040
-
SHA512
a55217a4e44001a432204d94ce0763a0819ff24dca969d202e59695499f67b4c89e64cec321afaabf13f186a94b5e426955964615e01f5ad7b49db04aa0df7d1
-
SSDEEP
49152:evgt62XlaSFNWPjljiFa2RoUYIBZY3Iar70oGd9eTHHB72eh2NT:evM62XlaSFNWPjljiFXRoUYI83K
Behavioral task
behavioral1
Sample
CatWare.exe
Resource
win7-20241023-en
Malware Config
Extracted
quasar
1.4.1
ratted
192.168.1.90:4782
c88aa6bc-e16c-4a3b-b3c1-319b31585ecc
-
encryption_key
0840B8A7EBCF09FE22D53C459C6E856527018552
-
install_name
Mapper.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Discord inc.
-
subdirectory
SubDir
Targets
-
-
Target
CatWare.exe
-
Size
3.1MB
-
MD5
803cc54f484ecae234df37adb1a297ae
-
SHA1
1562c04da59e2394dc6d253875c34c55b44fb399
-
SHA256
475d80a9c80ae084c34d321bc8d6d97a9ad8394b608f62cfa53e0b0313d6e040
-
SHA512
a55217a4e44001a432204d94ce0763a0819ff24dca969d202e59695499f67b4c89e64cec321afaabf13f186a94b5e426955964615e01f5ad7b49db04aa0df7d1
-
SSDEEP
49152:evgt62XlaSFNWPjljiFa2RoUYIBZY3Iar70oGd9eTHHB72eh2NT:evM62XlaSFNWPjljiFXRoUYI83K
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-