General
-
Target
112052df0155dc61ccd59a085552acc2.bin
-
Size
1.2MB
-
Sample
241118-bdcp9avdjm
-
MD5
5148a8956e65e99214e664f3b0bc0ae4
-
SHA1
aaae609f603949e8a0916b7520c2a9e27c7f9d9d
-
SHA256
b065237f7ad313c1457095763cc84b4148d09738701e8cfb1a9d0cebd0005587
-
SHA512
207f44333cdb912c86daad5f5384212749214ce5f4c5c64d3561964d904995dcb687764f149dea0df2d0a9aa6103906b254bdefc872620b4afdfa48809291375
-
SSDEEP
24576:0gYiSGBIgDOsSl0ScpBw2H8gqVM6+uXBg0La3VPKqKY3t+jUI2X:RSGBgsSlug2uRg0La3VPZKY3t+4X
Behavioral task
behavioral1
Sample
ccb2c986ff616e7cef66ed4d54c5845c9af511bd3b796e1d7ca5d5a41b60367b.exe
Resource
win7-20240729-en
Malware Config
Extracted
quasar
1.4.1
Office04
154.83.15.5:4782
f471b896-c945-43dc-9217-eb1657caa328
-
encryption_key
2B2223EBAC01E73CC719C15E7C1A885C0BBF24EC
-
install_name
ww.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
ccb2c986ff616e7cef66ed4d54c5845c9af511bd3b796e1d7ca5d5a41b60367b.exe
-
Size
3.1MB
-
MD5
112052df0155dc61ccd59a085552acc2
-
SHA1
0da0103f733680888948585e1e1cbb50711c0a3f
-
SHA256
ccb2c986ff616e7cef66ed4d54c5845c9af511bd3b796e1d7ca5d5a41b60367b
-
SHA512
78f7bfc985fbae2f030ea1268d087b7b68e532bd3f44181fe0c28dd906ebbb858687209b60fbf7d1f8cdc84ee09374a9d55cfb0834ae9fd51e98b5effcb60645
-
SSDEEP
49152:zvkI22SsaNYfdPBldt698dBcjHetxNESEUk/iSboGdzTHHB72eh2NT:zvJ22SsaNYfdPBldt6+dBcjH4xjU
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-