General
-
Target
guwahdsadasdsdadas.exe
-
Size
3.1MB
-
Sample
241207-c67a1a1qay
-
MD5
8c18dd1ddcbedeae5f0899595eaf33a7
-
SHA1
5abff6dd235e817d560bda3d4bf2a11b1f4bd292
-
SHA256
504ede0cfa90eafc6b86402fcdfc07d6e6361a4cdd3a2c4a3682133ddb84d57b
-
SHA512
50769dbbdc15a292d04d400af8a2fa95675e68b5fc5ce783bdcde24c0a76fa2896dbe66f21d3b3d4cd9452a19735d2d0a13561b840433342431652dcbfaca8d8
-
SSDEEP
49152:fvelL26AaNeWgPhlmVqvMQ7XSKYEmMmzNRoGdzTHHB72eh2NT:fvOL26AaNeWgPhlmVqkQ7XSKYEmN
Malware Config
Extracted
quasar
1.4.1
roar
fojeweb571-64431.portmap.host:8848
0c203952-83f0-40e8-a93c-b701163cc930
-
encryption_key
B42CE86AEBA4D8818352F4D811EA7BBB472E229A
-
install_name
windows defender.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
discord
-
subdirectory
SubDir
Targets
-
-
Target
guwahdsadasdsdadas.exe
-
Size
3.1MB
-
MD5
8c18dd1ddcbedeae5f0899595eaf33a7
-
SHA1
5abff6dd235e817d560bda3d4bf2a11b1f4bd292
-
SHA256
504ede0cfa90eafc6b86402fcdfc07d6e6361a4cdd3a2c4a3682133ddb84d57b
-
SHA512
50769dbbdc15a292d04d400af8a2fa95675e68b5fc5ce783bdcde24c0a76fa2896dbe66f21d3b3d4cd9452a19735d2d0a13561b840433342431652dcbfaca8d8
-
SSDEEP
49152:fvelL26AaNeWgPhlmVqvMQ7XSKYEmMmzNRoGdzTHHB72eh2NT:fvOL26AaNeWgPhlmVqkQ7XSKYEmN
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-