General
-
Target
hmm.exe
-
Size
3.1MB
-
Sample
241116-3eysnazpbm
-
MD5
ee9ed61568e4fce02ab542c67cfd1b2e
-
SHA1
4df048ac26de94335d7dd6401afb0e6c9c56779c
-
SHA256
b3c40f057551db10381b772c0bd45dce4f4ffc8eeba424a985f8716e595629e0
-
SHA512
83dd4d2263ce3e43e10ff79822208a66653cdcf0a84d46adca966348be6a9683e992a9f1abd82c95548cdbb02f3d1b0b8e6e4f7fff301c614fba517875c372d1
-
SSDEEP
49152:3vyI22SsaNYfdPBldt698dBcjHuHDLoG8O+THHB72eh2NT:3vf22SsaNYfdPBldt6+dBcjHuHPh
Malware Config
Extracted
quasar
1.4.1
Office04
azxq0ap.localto.net:3425
e51e2b65-e963-4051-9736-67d57ed46798
-
encryption_key
AEA258EF65BF1786F0F767C0BE2497ECC304C46F
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
hmm.exe
-
Size
3.1MB
-
MD5
ee9ed61568e4fce02ab542c67cfd1b2e
-
SHA1
4df048ac26de94335d7dd6401afb0e6c9c56779c
-
SHA256
b3c40f057551db10381b772c0bd45dce4f4ffc8eeba424a985f8716e595629e0
-
SHA512
83dd4d2263ce3e43e10ff79822208a66653cdcf0a84d46adca966348be6a9683e992a9f1abd82c95548cdbb02f3d1b0b8e6e4f7fff301c614fba517875c372d1
-
SSDEEP
49152:3vyI22SsaNYfdPBldt698dBcjHuHDLoG8O+THHB72eh2NT:3vf22SsaNYfdPBldt6+dBcjHuHPh
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-