General
-
Target
rye.exe
-
Size
3.1MB
-
Sample
241207-x1nlxstrcj
-
MD5
39249134ee254528793864dac9b3415b
-
SHA1
4ea6648cc6d44968901d290ea73945b7e7cd9ab1
-
SHA256
e70d3052f010b4dd1d942232fa24e52a8ac42dfa3d32ac8019c473e91d75748a
-
SHA512
516bad12c22b8f1b19f56112dc82da99d9af9478dfbda3e2933ccb244964ff0d9331f3bec4c62483313ff2e3f795ce1e318eeaf81b94a8ec19844f632f941a4b
-
SSDEEP
49152:HvHG42pda6D+/PjlLOlg6yQipV64m7mzjLoGd50THHB72eh2NT:Hvm42pda6D+/PjlLOlZyQipV64mAJ
Behavioral task
behavioral1
Sample
rye.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rye.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.4.1
thecoolfile
dfsgmnhsrf23456623423456-20848.portmap.host:20848
83c15bb2-6249-4f2e-a6a8-94b180bf1a42
-
encryption_key
B42CE86AEBA4D8818352F4D811EA7BBB472E229A
-
install_name
windows defender.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
discord
-
subdirectory
SubDir
Targets
-
-
Target
rye.exe
-
Size
3.1MB
-
MD5
39249134ee254528793864dac9b3415b
-
SHA1
4ea6648cc6d44968901d290ea73945b7e7cd9ab1
-
SHA256
e70d3052f010b4dd1d942232fa24e52a8ac42dfa3d32ac8019c473e91d75748a
-
SHA512
516bad12c22b8f1b19f56112dc82da99d9af9478dfbda3e2933ccb244964ff0d9331f3bec4c62483313ff2e3f795ce1e318eeaf81b94a8ec19844f632f941a4b
-
SSDEEP
49152:HvHG42pda6D+/PjlLOlg6yQipV64m7mzjLoGd50THHB72eh2NT:Hvm42pda6D+/PjlLOlZyQipV64mAJ
Score10/10-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-