General
-
Target
coldstart.exe
-
Size
3.1MB
-
Sample
241117-ele25azmhz
-
MD5
f203168d523e70b35b8d3fc729c22144
-
SHA1
60232dde8f123dcb45453df4f29baf81fac3353a
-
SHA256
27397e611181aeea033279de2b1ff98d6f3f7a1dd9e72f67bac35d94025d38ab
-
SHA512
53c950febedae2a9cf6a64b86b7e3b9abf000641eb7f1c056bebcb8117889671a6569a2650dac4566f26e6ef531df40b23ca15425a5a005dbe30ce13f96e748a
-
SSDEEP
49152:CvbI22SsaNYfdPBldt698dBcjHbktwOBxgDoGdiSRTHHB72eh2NT:Cvk22SsaNYfdPBldt6+dBcjHSwR
Behavioral task
behavioral1
Sample
coldstart.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
10.211.55.25:4782
bcdc82e5-0aef-44c0-9c1b-922134e29c07
-
encryption_key
6A71CE09A1F29B83F2F2D2942418EC75697893A6
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
coldstart.exe
-
Size
3.1MB
-
MD5
f203168d523e70b35b8d3fc729c22144
-
SHA1
60232dde8f123dcb45453df4f29baf81fac3353a
-
SHA256
27397e611181aeea033279de2b1ff98d6f3f7a1dd9e72f67bac35d94025d38ab
-
SHA512
53c950febedae2a9cf6a64b86b7e3b9abf000641eb7f1c056bebcb8117889671a6569a2650dac4566f26e6ef531df40b23ca15425a5a005dbe30ce13f96e748a
-
SSDEEP
49152:CvbI22SsaNYfdPBldt698dBcjHbktwOBxgDoGdiSRTHHB72eh2NT:Cvk22SsaNYfdPBldt6+dBcjHSwR
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-