General
-
Target
a45b373b780f5b9fcf5c51473c69bbf0ed650f300523097602b35f5222bd122b.exe
-
Size
3.1MB
-
Sample
241214-phy1yatkbn
-
MD5
94222631ef1071a4f7ceb180cf8a4a5a
-
SHA1
786d8b2d8b931a9282ee54367d2dda501f1ca946
-
SHA256
a45b373b780f5b9fcf5c51473c69bbf0ed650f300523097602b35f5222bd122b
-
SHA512
00503983a35e8d0f65eea6a811d7177a389cb1b4d8716d32e50fd5346deb428cd472cbaca7375c56ac3f113ea76db55322993b4d68d816b50a4b27887a2fa14d
-
SSDEEP
49152:ivht62XlaSFNWPjljiFa2RoUYIo7RJ6SbR3LoGd+vTHHB72eh2NT:ivL62XlaSFNWPjljiFXRoUYIo7RJ6M
Behavioral task
behavioral1
Sample
a45b373b780f5b9fcf5c51473c69bbf0ed650f300523097602b35f5222bd122b.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
91.92.243.191:5401
fce41024-0e2f-475b-929b-e58a126341bd
-
encryption_key
802CAE367B042C840DD4E29539BB1BFEC16FB48A
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
vchost32
-
subdirectory
SubDir
Targets
-
-
Target
a45b373b780f5b9fcf5c51473c69bbf0ed650f300523097602b35f5222bd122b.exe
-
Size
3.1MB
-
MD5
94222631ef1071a4f7ceb180cf8a4a5a
-
SHA1
786d8b2d8b931a9282ee54367d2dda501f1ca946
-
SHA256
a45b373b780f5b9fcf5c51473c69bbf0ed650f300523097602b35f5222bd122b
-
SHA512
00503983a35e8d0f65eea6a811d7177a389cb1b4d8716d32e50fd5346deb428cd472cbaca7375c56ac3f113ea76db55322993b4d68d816b50a4b27887a2fa14d
-
SSDEEP
49152:ivht62XlaSFNWPjljiFa2RoUYIo7RJ6SbR3LoGd+vTHHB72eh2NT:ivL62XlaSFNWPjljiFXRoUYIo7RJ6M
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-