General
-
Target
yeiifsd.exe
-
Size
3.1MB
-
Sample
241110-3v7qhaxfpm
-
MD5
b96f34b2886c779fbb6ac0abdb109d31
-
SHA1
95049b5972383e62d542db1f403ae86197619950
-
SHA256
c1a0da5554f0b9f6869f7b9f74fd7cdc714c7afb69cc36ac4fbeb64ecb2a6bba
-
SHA512
0cf92ebeca7675d72cebd554225b778e49f57295ce63bf4b0261540b41249b419473d949015b423257df04be2bda96fc3f716d227879cb252aeccdc7d0516365
-
SSDEEP
49152:mv+lL26AaNeWgPhlmVqvMQ7XSKBCmymzZYoGd3THHB72eh2NT:mvuL26AaNeWgPhlmVqkQ7XSKBCm6
Malware Config
Extracted
quasar
1.4.1
Office04
a007-190-104-116-8.ngrok-free.app:4782
e51e2b65-e963-4051-9736-67d57ed46798
-
encryption_key
AEA258EF65BF1786F0F767C0BE2497ECC304C46F
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
yeiifsd.exe
-
Size
3.1MB
-
MD5
b96f34b2886c779fbb6ac0abdb109d31
-
SHA1
95049b5972383e62d542db1f403ae86197619950
-
SHA256
c1a0da5554f0b9f6869f7b9f74fd7cdc714c7afb69cc36ac4fbeb64ecb2a6bba
-
SHA512
0cf92ebeca7675d72cebd554225b778e49f57295ce63bf4b0261540b41249b419473d949015b423257df04be2bda96fc3f716d227879cb252aeccdc7d0516365
-
SSDEEP
49152:mv+lL26AaNeWgPhlmVqvMQ7XSKBCmymzZYoGd3THHB72eh2NT:mvuL26AaNeWgPhlmVqkQ7XSKBCm6
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-