General
-
Target
built.exe
-
Size
348KB
-
Sample
241214-zbheqatkgz
-
MD5
fb1057eee229c44ceea060397b9f8ff1
-
SHA1
0528f64effa73492a54a97535ee1a4e65d0ad023
-
SHA256
97a83514d72fdb32ff49a7c8526c4a180a5affefc1af9f2abd9c799aa3ac0548
-
SHA512
899c3e467379c04e32e4ca9868640c3e4a282c40780ebb5be63677d4c2155e5970e37f6e490e45796b7964a8736d24aa50936861236b29e7dfc71b9cc43dd892
-
SSDEEP
6144:1mSiPqU23zkkEUcadASlBx+bS7VqlvfbbOA30DbJi:coU2fIS11EtbOu0DbJi
Behavioral task
behavioral1
Sample
built.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.3.0.0
Test
100.115.92.196:8080
100.115.92.196:22
100.115.92.196:3389
QSR_MUTEX_B6Q8duJmC3tqQvImXE
-
encryption_key
Fv3xsfvJChgh6yTF3T1x
-
install_name
win.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Runtime
-
subdirectory
SubDir
Targets
-
-
Target
built.exe
-
Size
348KB
-
MD5
fb1057eee229c44ceea060397b9f8ff1
-
SHA1
0528f64effa73492a54a97535ee1a4e65d0ad023
-
SHA256
97a83514d72fdb32ff49a7c8526c4a180a5affefc1af9f2abd9c799aa3ac0548
-
SHA512
899c3e467379c04e32e4ca9868640c3e4a282c40780ebb5be63677d4c2155e5970e37f6e490e45796b7964a8736d24aa50936861236b29e7dfc71b9cc43dd892
-
SSDEEP
6144:1mSiPqU23zkkEUcadASlBx+bS7VqlvfbbOA30DbJi:coU2fIS11EtbOu0DbJi
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-