General
-
Target
sdaasd.exe
-
Size
3.1MB
-
Sample
241114-3a76jaylbr
-
MD5
5b33b455e4f7c1aaa73b3304399d5b00
-
SHA1
21a0ce3f7bb6c3fb4a9eb164a1d27f3bec4da3c5
-
SHA256
8a73c6cabf1abc6bc2dbbd19b6da87b72de28021104d11bc2978e3869b36c275
-
SHA512
76d6c5937c4745cad21edd2464d67ed8e2c93fb368980dfa070dc5e6950686ca7db9fae25ab1299f5ea1c6b003cc11ff794a8657d1fd73141135b19a0fd3bdbd
-
SSDEEP
49152:OvbY52fyaSZOrPWluWBuGG5g5hzEGXBeoxosdbTHHB72eh2NT:Ovc52fyaSZOrPWluWBDG5g5hAGb
Behavioral task
behavioral1
Sample
sdaasd.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
dsa
192.168.1.4:80
c60d7f4c-403e-439b-9ef0-75681aa82598
-
encryption_key
84EEFDB37698E582E7732B4568EC490426D1D6DF
-
install_name
123123.exe
-
log_directory
123
-
reconnect_delay
3000
-
startup_key
Broker
-
subdirectory
3
Targets
-
-
Target
sdaasd.exe
-
Size
3.1MB
-
MD5
5b33b455e4f7c1aaa73b3304399d5b00
-
SHA1
21a0ce3f7bb6c3fb4a9eb164a1d27f3bec4da3c5
-
SHA256
8a73c6cabf1abc6bc2dbbd19b6da87b72de28021104d11bc2978e3869b36c275
-
SHA512
76d6c5937c4745cad21edd2464d67ed8e2c93fb368980dfa070dc5e6950686ca7db9fae25ab1299f5ea1c6b003cc11ff794a8657d1fd73141135b19a0fd3bdbd
-
SSDEEP
49152:OvbY52fyaSZOrPWluWBuGG5g5hzEGXBeoxosdbTHHB72eh2NT:Ovc52fyaSZOrPWluWBDG5g5hAGb
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-