General
-
Target
56bd84e77da1de080c2d5c42b6f101574e7146b200026ea9468703d742edec10.exe
-
Size
1.4MB
-
Sample
241119-e6zbha1dkp
-
MD5
abbfb2b5ebf6a24eef7269bde8e80640
-
SHA1
99be0b33db303c353262f43d7c2e43a03b5e7b65
-
SHA256
56bd84e77da1de080c2d5c42b6f101574e7146b200026ea9468703d742edec10
-
SHA512
2dedaec26edd4e9b23b31bdab83fabd88884da7958f4e7611fb7667cd3ddc6a795cf7b1b79abcf0c6f13b03ac74763532705e316742f1052a1a5f6e5bb92dd6d
-
SSDEEP
12288:b/bzOGnF/lx54LOaJleaqIs/eBj52DYWQNwF/zsjVODN/B:bmGLZmx5gYWRaYJ/
Static task
static1
Behavioral task
behavioral1
Sample
56bd84e77da1de080c2d5c42b6f101574e7146b200026ea9468703d742edec10.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
man
new-visit.com:3791
3302836a-f2f9-4646-981e-42b54ed610dd
-
encryption_key
C058A6A166AF85C9027394334AA2BDC41A9B7D9C
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
56bd84e77da1de080c2d5c42b6f101574e7146b200026ea9468703d742edec10.exe
-
Size
1.4MB
-
MD5
abbfb2b5ebf6a24eef7269bde8e80640
-
SHA1
99be0b33db303c353262f43d7c2e43a03b5e7b65
-
SHA256
56bd84e77da1de080c2d5c42b6f101574e7146b200026ea9468703d742edec10
-
SHA512
2dedaec26edd4e9b23b31bdab83fabd88884da7958f4e7611fb7667cd3ddc6a795cf7b1b79abcf0c6f13b03ac74763532705e316742f1052a1a5f6e5bb92dd6d
-
SSDEEP
12288:b/bzOGnF/lx54LOaJleaqIs/eBj52DYWQNwF/zsjVODN/B:bmGLZmx5gYWRaYJ/
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Drops startup file
-
Suspicious use of SetThreadContext
-