General
-
Target
main.bat
-
Size
5KB
-
Sample
241122-dfw8sayqel
-
MD5
9079b22a006d46af116cd7f27534f131
-
SHA1
9f9fd7a2234cad3de7ea9acf55c05034d124c6e2
-
SHA256
ec2f7e6633f2eb4214371bc3701342599d6cfa0d6d94cd0b0f0c77e78d2bcd6c
-
SHA512
cd36c23a25031056c74c38212f859b0ce78556347c60ab2b797743fc821676a0df633b66acbbc6812e2b696560df941af1208f284d5176d4ac083ecdd88375c8
-
SSDEEP
24:6I5MGfsNZSp805N0DW0i0+0eW000vZ0/W0w0bw0noW0KUQ0q+w0wW0z0a0lW0ujs:6R8sNZSptWM5m1otCigAq0
Static task
static1
Malware Config
Extracted
quasar
1.4.1
bot
wooting2000-47095.portmap.host:47095
2e05f1ef-743b-4020-b18a-7f4276517e8b
-
encryption_key
E83D6FC31962786DAEA703F111D2381786DF06CA
-
install_name
Modification1.5.14.12.exe
-
log_directory
Logs
-
reconnect_delay
3126
-
startup_key
explorer.dll
-
subdirectory
SubDir
Targets
-
-
Target
main.bat
-
Size
5KB
-
MD5
9079b22a006d46af116cd7f27534f131
-
SHA1
9f9fd7a2234cad3de7ea9acf55c05034d124c6e2
-
SHA256
ec2f7e6633f2eb4214371bc3701342599d6cfa0d6d94cd0b0f0c77e78d2bcd6c
-
SHA512
cd36c23a25031056c74c38212f859b0ce78556347c60ab2b797743fc821676a0df633b66acbbc6812e2b696560df941af1208f284d5176d4ac083ecdd88375c8
-
SSDEEP
24:6I5MGfsNZSp805N0DW0i0+0eW000vZ0/W0w0bw0noW0KUQ0q+w0wW0z0a0lW0ujs:6R8sNZSptWM5m1otCigAq0
-
Quasar family
-
Quasar payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-