General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
241207-qh6w8atkc1
-
MD5
8d2777f7a9541759b2d6a4d713a5e0db
-
SHA1
f99839b640dd713cde9515fe9962bb344ef65f4f
-
SHA256
175d2c313c08824712c3225985c2c166b93337ccb1cf1a7dffae3b284a7f3579
-
SHA512
544c55362443bf3f941319f84bae875db3ab9af29f31967a7cf2eb35aefba38e29ea2117c7dd43d7c6828cb0f37adee314aeefb7929e48a555e19138c3b15abf
-
SSDEEP
49152:PvelL26AaNeWgPhlmVqvMQ7XSKUc1oLoGdATHHB72eh2NT:PvOL26AaNeWgPhlmVqkQ7XSKUc1G
Malware Config
Extracted
quasar
1.4.1
roar
fojeweb571-45302.portmap.host:45302
703bfb38-0c01-48b6-b84b-a41889e3bcdd
-
encryption_key
B42CE86AEBA4D8818352F4D811EA7BBB472E229A
-
install_name
windows defender.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
discord
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
8d2777f7a9541759b2d6a4d713a5e0db
-
SHA1
f99839b640dd713cde9515fe9962bb344ef65f4f
-
SHA256
175d2c313c08824712c3225985c2c166b93337ccb1cf1a7dffae3b284a7f3579
-
SHA512
544c55362443bf3f941319f84bae875db3ab9af29f31967a7cf2eb35aefba38e29ea2117c7dd43d7c6828cb0f37adee314aeefb7929e48a555e19138c3b15abf
-
SSDEEP
49152:PvelL26AaNeWgPhlmVqvMQ7XSKUc1oLoGdATHHB72eh2NT:PvOL26AaNeWgPhlmVqkQ7XSKUc1G
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-