General
-
Target
344f6de65a483ad7a020969700d09d72.exe
-
Size
3.6MB
-
Sample
241101-znjtbavfnf
-
MD5
344f6de65a483ad7a020969700d09d72
-
SHA1
c8ce64edf227beadb3b445f2ded81313b885f1ae
-
SHA256
3500bbffeb19a0e63ba255abcbc2f7c3a5985aa6f4eda3490dd7a795bc546540
-
SHA512
de6637315b3900cace3bbc096ea459310b265835c00cb769f5bf29a8ec2592e3db1c74656099886fe4a5afcaec33e8a9dacaaa0a88c65d2be9e40478e6f1646c
-
SSDEEP
98304:6P4PLLSLRqETI5tSTGkmJhCyUqeuanHOp8:rUClJhCyUqGnHY
Static task
static1
Behavioral task
behavioral1
Sample
344f6de65a483ad7a020969700d09d72.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Ikeya
ikeya.ydns.eu:1979
4d6bdac9-e1ab-48f1-a31b-211bd19cfad1
-
encryption_key
06D26BCF3E82015C2B11E1D89A21612299A5931B
-
install_name
windows.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
344f6de65a483ad7a020969700d09d72.exe
-
Size
3.6MB
-
MD5
344f6de65a483ad7a020969700d09d72
-
SHA1
c8ce64edf227beadb3b445f2ded81313b885f1ae
-
SHA256
3500bbffeb19a0e63ba255abcbc2f7c3a5985aa6f4eda3490dd7a795bc546540
-
SHA512
de6637315b3900cace3bbc096ea459310b265835c00cb769f5bf29a8ec2592e3db1c74656099886fe4a5afcaec33e8a9dacaaa0a88c65d2be9e40478e6f1646c
-
SSDEEP
98304:6P4PLLSLRqETI5tSTGkmJhCyUqeuanHOp8:rUClJhCyUqGnHY
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-