General
-
Target
ea0dbb78a37927ed07f0c30ad9e814c2f71a16e9a6e8356726f03637bb48a848.cmd
-
Size
2.0MB
-
Sample
241111-ramn2szemj
-
MD5
a83ac24f3b7291351f52ea99c33b43ca
-
SHA1
4819de0035af164608341bdab34fe277cc517536
-
SHA256
ea0dbb78a37927ed07f0c30ad9e814c2f71a16e9a6e8356726f03637bb48a848
-
SHA512
af2301759d1037f609b876090eb188f0747ecf7c4d3e5ebd23395389dd23c1398cd123a902d015d47018f1ef686b44908cca3280d86ccc4a1993b7c0388b9551
-
SSDEEP
24576:r7ftZVfP4Eg45n691f/qE71faFpIx6SXP1nOEunZ8/O2x01+dHepYAk0NkVG7/dp:rdLA9Fi7IxDRK294y7D/h2R
Static task
static1
Behavioral task
behavioral1
Sample
ea0dbb78a37927ed07f0c30ad9e814c2f71a16e9a6e8356726f03637bb48a848.cmd
Resource
win7-20240708-en
Malware Config
Extracted
quasar
1.4.1
Office04
walkout.ddnsgeek.com:8080
27391f85-a482-471a-b2cd-1f8ab5bde32e
-
encryption_key
6469F8C5BA9A2CFDCF4A3F1651D1E92DBEA41117
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
ea0dbb78a37927ed07f0c30ad9e814c2f71a16e9a6e8356726f03637bb48a848.cmd
-
Size
2.0MB
-
MD5
a83ac24f3b7291351f52ea99c33b43ca
-
SHA1
4819de0035af164608341bdab34fe277cc517536
-
SHA256
ea0dbb78a37927ed07f0c30ad9e814c2f71a16e9a6e8356726f03637bb48a848
-
SHA512
af2301759d1037f609b876090eb188f0747ecf7c4d3e5ebd23395389dd23c1398cd123a902d015d47018f1ef686b44908cca3280d86ccc4a1993b7c0388b9551
-
SSDEEP
24576:r7ftZVfP4Eg45n691f/qE71faFpIx6SXP1nOEunZ8/O2x01+dHepYAk0NkVG7/dp:rdLA9Fi7IxDRK294y7D/h2R
-
Quasar family
-
Quasar payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-