General
-
Target
porfaaa.exe
-
Size
3.1MB
-
Sample
241106-1w2vjaxqhs
-
MD5
6a0e509826fa8bbebabe5f79ace2ef27
-
SHA1
aec54ebce312edce5ba80335aebcc7b599383166
-
SHA256
569da6bbe85c8810e6f9cf1b884be9257a227d4c29c4c81888999c0e583cba80
-
SHA512
442653aa58c5287131e7d4ac90609c4f05a92992e44d9efadd06bed60e25bd1f7eb2f89588b792243dc4b70cd1f64e2f017874e1a6b38b9807de2c90c9afcfaf
-
SSDEEP
49152:3vyI22SsaNYfdPBldt698dBcjH7bRJ65bR3LoGd4BTHHB72eh2NT:3vf22SsaNYfdPBldt6+dBcjH7bRJ67I
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.0.9:139
e51e2b65-e963-4051-9736-67d57ed46798
-
encryption_key
AEA258EF65BF1786F0F767C0BE2497ECC304C46F
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
porfaaa.exe
-
Size
3.1MB
-
MD5
6a0e509826fa8bbebabe5f79ace2ef27
-
SHA1
aec54ebce312edce5ba80335aebcc7b599383166
-
SHA256
569da6bbe85c8810e6f9cf1b884be9257a227d4c29c4c81888999c0e583cba80
-
SHA512
442653aa58c5287131e7d4ac90609c4f05a92992e44d9efadd06bed60e25bd1f7eb2f89588b792243dc4b70cd1f64e2f017874e1a6b38b9807de2c90c9afcfaf
-
SSDEEP
49152:3vyI22SsaNYfdPBldt698dBcjH7bRJ65bR3LoGd4BTHHB72eh2NT:3vf22SsaNYfdPBldt6+dBcjH7bRJ67I
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-