General
-
Target
testingfile.exe
-
Size
3.1MB
-
Sample
241213-l55v8avmat
-
MD5
4489c3282400ad9e96ea5ca7c28e6369
-
SHA1
91a2016778cce0e880636d236efca38cf0a7713d
-
SHA256
cc68b1903e22d22e6f0a29bcdf46825d5c57747d8eb3a75672a4d6930f60fe77
-
SHA512
adaeab8aa666057ff008e86f96ae6b9a36ff2f276fdd49f6663c300357f3dc10f59fac7700bb385aa35887918a830e18bddaa41b3305d913566f58aa428a72b0
-
SSDEEP
49152:fvmI22SsaNYfdPBldt698dBcjH+ixNESEtk/i/LoGdCUTHHB72eh2NT:fvr22SsaNYfdPBldt6+dBcjHTx0D
Behavioral task
behavioral1
Sample
testingfile.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
testinghigger-42471.portmap.host:42471
7a5f2afa-38ce-4bed-8e42-d1108199a2b3
-
encryption_key
0F8B61E5223AD57FA54A04631691138A0F76FAE4
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
wod2
-
subdirectory
SubDir
Targets
-
-
Target
testingfile.exe
-
Size
3.1MB
-
MD5
4489c3282400ad9e96ea5ca7c28e6369
-
SHA1
91a2016778cce0e880636d236efca38cf0a7713d
-
SHA256
cc68b1903e22d22e6f0a29bcdf46825d5c57747d8eb3a75672a4d6930f60fe77
-
SHA512
adaeab8aa666057ff008e86f96ae6b9a36ff2f276fdd49f6663c300357f3dc10f59fac7700bb385aa35887918a830e18bddaa41b3305d913566f58aa428a72b0
-
SSDEEP
49152:fvmI22SsaNYfdPBldt698dBcjH+ixNESEtk/i/LoGdCUTHHB72eh2NT:fvr22SsaNYfdPBldt6+dBcjHTx0D
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-