General
-
Target
hbfgjhhesfd.exe
-
Size
288KB
-
Sample
241213-l3dc7awqgm
-
MD5
2b3a191ee1f6d3b21d03ee54aa40b604
-
SHA1
8ecae557c2735105cc573d86820e81fcff0139c4
-
SHA256
f0d45f8340cd203ee98c7765267175576d8017df5166f425f8a7483cb35a91c8
-
SHA512
31f621fd96bf2964529607ae64a173c4a99f3976a91283a3609edc3799d98f59de80da6266ca10c26e5c8733644f1764aab00c7ba3e4dc5456573b9b20b6a393
-
SSDEEP
6144:k7zO0LSclT6FOwEP5Kq+SMv0VGb7bDcllbken:alJtTF9zVGkllbkm
Behavioral task
behavioral1
Sample
hbfgjhhesfd.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.0.0
Office
82.117.243.110:5173
edH11NGQWIdCwvLx00
-
encryption_key
aGPuRaDerdUDJPrAfXtB
-
install_name
csrss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Framework
-
subdirectory
SubDir
Targets
-
-
Target
hbfgjhhesfd.exe
-
Size
288KB
-
MD5
2b3a191ee1f6d3b21d03ee54aa40b604
-
SHA1
8ecae557c2735105cc573d86820e81fcff0139c4
-
SHA256
f0d45f8340cd203ee98c7765267175576d8017df5166f425f8a7483cb35a91c8
-
SHA512
31f621fd96bf2964529607ae64a173c4a99f3976a91283a3609edc3799d98f59de80da6266ca10c26e5c8733644f1764aab00c7ba3e4dc5456573b9b20b6a393
-
SSDEEP
6144:k7zO0LSclT6FOwEP5Kq+SMv0VGb7bDcllbken:alJtTF9zVGkllbkm
-
Quasar family
-
Quasar payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-