General
-
Target
Creo.exe
-
Size
3.1MB
-
Sample
241106-1x42aayhnr
-
MD5
03aa151b986c25898130caa67cfc881d
-
SHA1
7248b1c0d26266ccf348ba2a21fd1ece572202b7
-
SHA256
ca3111848c23a14de0a9b6074f952c195ae1adaccaa768889c6f84cdfb044baa
-
SHA512
41bebb66e465b2e62ae144e0b095654906d8826751cce0c833de0f35b41a9caaf90b39de74e775e3af419269c2e941499562d59de3a0a8a5e9bec40d181f7c9f
-
SSDEEP
49152:uvyI22SsaNYfdPBldt698dBcjHLLjflEmLrk/znLZGdTLITHHB72eh2NT:uvf22SsaNYfdPBldt6+dBcjHnjfCLoL
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.0.9:62767
e51e2b65-e963-4051-9736-67d57ed46798
-
encryption_key
AEA258EF65BF1786F0F767C0BE2497ECC304C46F
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
Creo.exe
-
Size
3.1MB
-
MD5
03aa151b986c25898130caa67cfc881d
-
SHA1
7248b1c0d26266ccf348ba2a21fd1ece572202b7
-
SHA256
ca3111848c23a14de0a9b6074f952c195ae1adaccaa768889c6f84cdfb044baa
-
SHA512
41bebb66e465b2e62ae144e0b095654906d8826751cce0c833de0f35b41a9caaf90b39de74e775e3af419269c2e941499562d59de3a0a8a5e9bec40d181f7c9f
-
SSDEEP
49152:uvyI22SsaNYfdPBldt698dBcjHLLjflEmLrk/znLZGdTLITHHB72eh2NT:uvf22SsaNYfdPBldt6+dBcjHnjfCLoL
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-