General
-
Target
34724d55cdb275b2ddebae16b7b493468a0a3662f6d4fc3ddb071e9d4fcc520b.exe
-
Size
3.8MB
-
Sample
241123-yfwx8syrfq
-
MD5
e16816239c10837fdaf0d3d5febc4525
-
SHA1
b662a2201f17dc73c80034bb02a31cfe2d954dcd
-
SHA256
34724d55cdb275b2ddebae16b7b493468a0a3662f6d4fc3ddb071e9d4fcc520b
-
SHA512
faccb111fa03181cc9d1dab0f312821facb549465bb3adba8e0772c09b67758f31ff9ac5be786abc5881f3edfc5c9492448fddbf89a82256c3207072f966d9c2
-
SSDEEP
98304:O723YzTXNjOel1CI7f1qxBefg4+gVXCQCbSZUJ5Kg:O72ozzcel1CI7fNI4trCb7Kg
Static task
static1
Behavioral task
behavioral1
Sample
34724d55cdb275b2ddebae16b7b493468a0a3662f6d4fc3ddb071e9d4fcc520b.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
CODE
twart.myfirewall.org:9792
rency.ydns.eu:5287
wqo9.firewall-gateway.de:8841
02351e291-5d041-4fa37-932c7-869aeiQec514992
-
encryption_key
3145298725BA5E0DD56E87FFE3F8898EA81E6EDA
-
install_name
workbook.exe
-
log_directory
Logs
-
reconnect_delay
6000
-
startup_key
workbook
-
subdirectory
SubDir
Targets
-
-
Target
34724d55cdb275b2ddebae16b7b493468a0a3662f6d4fc3ddb071e9d4fcc520b.exe
-
Size
3.8MB
-
MD5
e16816239c10837fdaf0d3d5febc4525
-
SHA1
b662a2201f17dc73c80034bb02a31cfe2d954dcd
-
SHA256
34724d55cdb275b2ddebae16b7b493468a0a3662f6d4fc3ddb071e9d4fcc520b
-
SHA512
faccb111fa03181cc9d1dab0f312821facb549465bb3adba8e0772c09b67758f31ff9ac5be786abc5881f3edfc5c9492448fddbf89a82256c3207072f966d9c2
-
SSDEEP
98304:O723YzTXNjOel1CI7f1qxBefg4+gVXCQCbSZUJ5Kg:O72ozzcel1CI7fNI4trCb7Kg
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-