General
-
Target
wave-executor.exe
-
Size
3.2MB
-
Sample
241120-znlmxasflc
-
MD5
c6a2761a380fe89642ceabb80b8fcd02
-
SHA1
7127092d54fa5a77827eb01f975a29990c3927af
-
SHA256
8987314d0557f91f95e906b89b3856d39e248431e1a2597b7942c2b8dbb093d2
-
SHA512
599ca4a551ffa916c646bd2db44c2312d9fe3a6f39ed272886e9af1fe54cbf9f5a41f31efe78097f6586af575fa99e2ef74143590e168de015e6459e5c32164d
-
SSDEEP
98304:GvP22SsaNYfdPBldt6+dBcjHwMCuvlImr:4A7jQMCudIm
Behavioral task
behavioral1
Sample
wave-executor.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
rblx
2.tcp.eu.ngrok.io:14654
4db75728-7a45-4507-a778-a8ace1ed2269
-
encryption_key
4DE9D49BF4A14CD273D6EFBFCC1CAF4C36BBD512
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Multimedia Center
-
subdirectory
SubDir
Targets
-
-
Target
wave-executor.exe
-
Size
3.2MB
-
MD5
c6a2761a380fe89642ceabb80b8fcd02
-
SHA1
7127092d54fa5a77827eb01f975a29990c3927af
-
SHA256
8987314d0557f91f95e906b89b3856d39e248431e1a2597b7942c2b8dbb093d2
-
SHA512
599ca4a551ffa916c646bd2db44c2312d9fe3a6f39ed272886e9af1fe54cbf9f5a41f31efe78097f6586af575fa99e2ef74143590e168de015e6459e5c32164d
-
SSDEEP
98304:GvP22SsaNYfdPBldt6+dBcjHwMCuvlImr:4A7jQMCudIm
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-