General
-
Target
Payload.exe
-
Size
3.1MB
-
Sample
241213-zstjbazpgp
-
MD5
b0f4ccdba9627855a58b6f2f1673a3da
-
SHA1
bb39bbd34084efdf4d0a994fba6419819d68c766
-
SHA256
ef33af6a7f06d5dae8dd1da0412b795e1222bfd6ce447614c5cac912bcd3374d
-
SHA512
7af9f641349e406b4d4079580247e72e566ee142028086225b0469ca545e064d365d4aad01d261711b7692a1c0130c7af9f875a56b026d39cb4ed86d2844c2b6
-
SSDEEP
49152:WveI22SsaNYfdPBldt698dBcjHJLrhOmzmOoGdkTHHB72eh2NT:WvT22SsaNYfdPBldt6+dBcjHZrhp
Behavioral task
behavioral1
Sample
Payload.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
ukrainian.zapto.org:5552
951dc75d-80db-463e-bcd9-8d5e9db51950
-
encryption_key
6DE9B098AFBC1DB6507E7CF9A6B32D44488DC3BF
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
Payload.exe
-
Size
3.1MB
-
MD5
b0f4ccdba9627855a58b6f2f1673a3da
-
SHA1
bb39bbd34084efdf4d0a994fba6419819d68c766
-
SHA256
ef33af6a7f06d5dae8dd1da0412b795e1222bfd6ce447614c5cac912bcd3374d
-
SHA512
7af9f641349e406b4d4079580247e72e566ee142028086225b0469ca545e064d365d4aad01d261711b7692a1c0130c7af9f875a56b026d39cb4ed86d2844c2b6
-
SSDEEP
49152:WveI22SsaNYfdPBldt698dBcjHJLrhOmzmOoGdkTHHB72eh2NT:WvT22SsaNYfdPBldt6+dBcjHZrhp
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-