General
-
Target
6e39ea5185c45d33204cadb86a374e3a2224a4437a316e57fa6a051973fcb5d4.exe
-
Size
349KB
-
Sample
241119-q87w7swgrf
-
MD5
f74a56c1ae8315915efa57dc391dcace
-
SHA1
4a24d459bedf21c4ebf390313d6605caec76f862
-
SHA256
6e39ea5185c45d33204cadb86a374e3a2224a4437a316e57fa6a051973fcb5d4
-
SHA512
d0e24523933cb6816bb868279d1107e1bb4d73d1aa4f09689893d71ea11aed72e996033423f1cbc9c6bcc32482503104e32059dceff890244032e09d0dbe59fc
-
SSDEEP
6144:2K2J10qdSlEc39HGGZlMi9MqKQPxjub0n6RKCKSU+yTp0xr:2KFXZhMqKQJjDwKjd0xr
Behavioral task
behavioral1
Sample
6e39ea5185c45d33204cadb86a374e3a2224a4437a316e57fa6a051973fcb5d4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6e39ea5185c45d33204cadb86a374e3a2224a4437a316e57fa6a051973fcb5d4.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.3.0.0
ProyectosCUU
192.168.1.198:4782
QSR_MUTEX_m5dUI8hKcZccXa2Bjv
-
encryption_key
hjqFnSRNHmM40urcuGMr
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
cles
Targets
-
-
Target
6e39ea5185c45d33204cadb86a374e3a2224a4437a316e57fa6a051973fcb5d4.exe
-
Size
349KB
-
MD5
f74a56c1ae8315915efa57dc391dcace
-
SHA1
4a24d459bedf21c4ebf390313d6605caec76f862
-
SHA256
6e39ea5185c45d33204cadb86a374e3a2224a4437a316e57fa6a051973fcb5d4
-
SHA512
d0e24523933cb6816bb868279d1107e1bb4d73d1aa4f09689893d71ea11aed72e996033423f1cbc9c6bcc32482503104e32059dceff890244032e09d0dbe59fc
-
SSDEEP
6144:2K2J10qdSlEc39HGGZlMi9MqKQPxjub0n6RKCKSU+yTp0xr:2KFXZhMqKQJjDwKjd0xr
Score10/10-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-