General
-
Target
thenewworkingrat.exe
-
Size
3.1MB
-
Sample
241207-t9jsjsskcn
-
MD5
00c08053c9ec8b1575cc1dc37454ef36
-
SHA1
a41c5e4a0a07eaf751068543c0892451b06a17a1
-
SHA256
b1949d403caba3fc8addc1779b003b18fd9744f075dc9002213aa4104cdbbac1
-
SHA512
eaeefc1bdf1c4a1c98e0befced54a6dc83a1598f9d409bae6c0876447c832171e418a16b0be210d7223ee256a4f85946fdf4c4ddc7b3d6981c5ea23ef9d8998b
-
SSDEEP
98304:Pvm42pda6D+/PjlLOlZyQipVJ9RJ6I5a:nyOpTV5a
Behavioral task
behavioral1
Sample
thenewworkingrat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
thenewworkingrat.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.4.1
thecoolfile
dfsgmnhsrf23456623423456-51636.portmap.host:51636
ba019940-beb5-4159-a5b2-ce0bc35ac066
-
encryption_key
B42CE86AEBA4D8818352F4D811EA7BBB472E229A
-
install_name
windows defender.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
discord
-
subdirectory
SubDir
Targets
-
-
Target
thenewworkingrat.exe
-
Size
3.1MB
-
MD5
00c08053c9ec8b1575cc1dc37454ef36
-
SHA1
a41c5e4a0a07eaf751068543c0892451b06a17a1
-
SHA256
b1949d403caba3fc8addc1779b003b18fd9744f075dc9002213aa4104cdbbac1
-
SHA512
eaeefc1bdf1c4a1c98e0befced54a6dc83a1598f9d409bae6c0876447c832171e418a16b0be210d7223ee256a4f85946fdf4c4ddc7b3d6981c5ea23ef9d8998b
-
SSDEEP
98304:Pvm42pda6D+/PjlLOlZyQipVJ9RJ6I5a:nyOpTV5a
Score10/10-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-