General
-
Target
PC_Booster.exe
-
Size
3.1MB
-
Sample
241120-h5ykcstakc
-
MD5
81d8571af28e42e2bbe60b5118173da6
-
SHA1
a826876a268bb7ebcf67b050707ff8a8e05ee6ef
-
SHA256
5fccda50065844a012e1425d3d9d60b608c6d5dc07514d32d04b1c55a1eade36
-
SHA512
b6f2dc77b046e4577a996495a6a5589f6ea263e61570ff362f2fb3386dc2b5c80c63ee6ab0678b36e1e11f7a3e46a9c5ed2cf33a5fb523e6afaed0f5a38da347
-
SSDEEP
49152:KvyI22SsaNYfdPBldt698dBcjHF9rwmCPLoGZB3voTHHB72eh2NT:Kvf22SsaNYfdPBldt6+dBcjHF9rQ
Behavioral task
behavioral1
Sample
PC_Booster.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.18:4782
4d099eab-30e3-4c3b-bf50-bf77e2e70e0f
-
encryption_key
04E6B8EB331AA0F74187E430ADEDBC1B79B631E4
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
PC_Booster.exe
-
Size
3.1MB
-
MD5
81d8571af28e42e2bbe60b5118173da6
-
SHA1
a826876a268bb7ebcf67b050707ff8a8e05ee6ef
-
SHA256
5fccda50065844a012e1425d3d9d60b608c6d5dc07514d32d04b1c55a1eade36
-
SHA512
b6f2dc77b046e4577a996495a6a5589f6ea263e61570ff362f2fb3386dc2b5c80c63ee6ab0678b36e1e11f7a3e46a9c5ed2cf33a5fb523e6afaed0f5a38da347
-
SSDEEP
49152:KvyI22SsaNYfdPBldt698dBcjHF9rwmCPLoGZB3voTHHB72eh2NT:Kvf22SsaNYfdPBldt6+dBcjHF9rQ
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-