General
-
Target
KMod Mod Menu.exe
-
Size
3.1MB
-
Sample
241117-pgcrbazdpm
-
MD5
cb709d5219f90d690c5d344583951b8e
-
SHA1
ef7cf1c88408a140a1224f3fa6dbcde8c6ed63cd
-
SHA256
55d23f7ddba20f057e61b777b3224255b9edf3f126eb30bb24a22cdfe55f8682
-
SHA512
edcff976d067281898bf6ca8b64c971c456fa92afa4e38e22af9cf9f0ec0701e4e114d196c200a4412c9600326a1cafe7edd394a5575c17e744aa167a1cb1139
-
SSDEEP
49152:3vyI22SsaNYfdPBldt698dBcjHoCt1JBLoGdVeTHHB72eh2NT:3vf22SsaNYfdPBldt6+dBcjHoCb
Behavioral task
behavioral1
Sample
KMod Mod Menu.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.126:4782
9be81df8-796e-4238-9ce9-95e1df50d0cc
-
encryption_key
911A94FD4CE2636A220E82F01C7CC3383A2C3D0C
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
KMod Mod Menu.exe
-
Size
3.1MB
-
MD5
cb709d5219f90d690c5d344583951b8e
-
SHA1
ef7cf1c88408a140a1224f3fa6dbcde8c6ed63cd
-
SHA256
55d23f7ddba20f057e61b777b3224255b9edf3f126eb30bb24a22cdfe55f8682
-
SHA512
edcff976d067281898bf6ca8b64c971c456fa92afa4e38e22af9cf9f0ec0701e4e114d196c200a4412c9600326a1cafe7edd394a5575c17e744aa167a1cb1139
-
SSDEEP
49152:3vyI22SsaNYfdPBldt698dBcjHoCt1JBLoGdVeTHHB72eh2NT:3vf22SsaNYfdPBldt6+dBcjHoCb
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-