General
-
Target
test.exe
-
Size
3.1MB
-
Sample
241215-vbs41azndt
-
MD5
d4d76dd987ddbf6c4be9cf1ff58cbfeb
-
SHA1
21bb07280d3ef10cb0983b8d795284530d0cf93a
-
SHA256
44be1930012524d9974e8150d3d387bf3c1cb7d52c13c31f02630bab7374e4cc
-
SHA512
f1b62314853bc09fe5aa41e0746018cbfd411115cb90c7e27edca8d2b1f572b2e270c481c4cdbf902e870ceef6c869bdad2f137159c506cb15142f4a5b738f4a
-
SSDEEP
49152:jvTlL26AaNeWgPhlmVqvMQ7XSKrBWau5p+Rk/0LoGdsTHHB72eh2NT:jvJL26AaNeWgPhlmVqkQ7XSKgad
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
Office04
agent-sellers.gl.at.ply.gg:31324
92c4e81f-9c37-4d95-9999-1d9c889d6132
-
encryption_key
EB7BD173527D0274DC795166855DE989150B7BE8
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
test.exe
-
Size
3.1MB
-
MD5
d4d76dd987ddbf6c4be9cf1ff58cbfeb
-
SHA1
21bb07280d3ef10cb0983b8d795284530d0cf93a
-
SHA256
44be1930012524d9974e8150d3d387bf3c1cb7d52c13c31f02630bab7374e4cc
-
SHA512
f1b62314853bc09fe5aa41e0746018cbfd411115cb90c7e27edca8d2b1f572b2e270c481c4cdbf902e870ceef6c869bdad2f137159c506cb15142f4a5b738f4a
-
SSDEEP
49152:jvTlL26AaNeWgPhlmVqvMQ7XSKrBWau5p+Rk/0LoGdsTHHB72eh2NT:jvJL26AaNeWgPhlmVqkQ7XSKgad
-
Quasar family
-
Quasar payload
-