General
-
Target
113c957ba369a4bea2068a9d5596f644e365cb81c19a28cce8ca1382ccc08e2d.cmd
-
Size
1.6MB
-
Sample
241111-l3hmxaxfmn
-
MD5
846debdd4c489b9cdf58cf035011385b
-
SHA1
edd9486a627bc3f35772e2e79eb7a3aa021569cd
-
SHA256
113c957ba369a4bea2068a9d5596f644e365cb81c19a28cce8ca1382ccc08e2d
-
SHA512
c46b02e2a54314bca1695e03196a7041aebe5bede3e857f62e0e634cc2c4ea9ed95d569a73c2b6c935afab5a961a0253ce40988e3c65d9ff33bbaa34a2376f51
-
SSDEEP
24576:RHSLwbi29FzHWBFGa+EWO41DglXFH9zW9jpWwhVBn2eWKT:/vDOGiWI2DtJ
Static task
static1
Behavioral task
behavioral1
Sample
113c957ba369a4bea2068a9d5596f644e365cb81c19a28cce8ca1382ccc08e2d.cmd
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
walkout.ddnsgeek.com:8080
27391f85-a482-471a-b2cd-1f8ab5bde32e
-
encryption_key
6469F8C5BA9A2CFDCF4A3F1651D1E92DBEA41117
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
113c957ba369a4bea2068a9d5596f644e365cb81c19a28cce8ca1382ccc08e2d.cmd
-
Size
1.6MB
-
MD5
846debdd4c489b9cdf58cf035011385b
-
SHA1
edd9486a627bc3f35772e2e79eb7a3aa021569cd
-
SHA256
113c957ba369a4bea2068a9d5596f644e365cb81c19a28cce8ca1382ccc08e2d
-
SHA512
c46b02e2a54314bca1695e03196a7041aebe5bede3e857f62e0e634cc2c4ea9ed95d569a73c2b6c935afab5a961a0253ce40988e3c65d9ff33bbaa34a2376f51
-
SSDEEP
24576:RHSLwbi29FzHWBFGa+EWO41DglXFH9zW9jpWwhVBn2eWKT:/vDOGiWI2DtJ
-
Quasar family
-
Quasar payload
-
Blocklisted process makes network request
-