General
-
Target
discord.exe
-
Size
3.1MB
-
Sample
241216-g8bpbszlan
-
MD5
6a0bb84dcd837e83638f4292180bf5ab
-
SHA1
20e31ccffe1ac806e75ea839ea90b4c91e4322c5
-
SHA256
e119fe767f3d10a387df1951d4b356384c5a9d0441b4034ddf7293c389a410b4
-
SHA512
d0d61815c1ca73e4d1b8d5c3ea61e0572bfa9f6e984247b8e66c22e5591d61f766c6476c2686ce611917a56f2d4d8b8ddb4efcdbed707855e4190a2404eedcc5
-
SSDEEP
49152:Ovkt62XlaSFNWPjljiFa2RoUYIUOzML6oGd4y/THHB72eh2NT:Ov462XlaSFNWPjljiFXRoUYIpzMG
Behavioral task
behavioral1
Sample
discord.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.43.241:4782
0517af80-95f0-4a6d-a904-5b7ee8faa157
-
encryption_key
6095BF6D5D58D02597F98370DFD1CCEB782F1EDD
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svhost
-
subdirectory
SubDir
Targets
-
-
Target
discord.exe
-
Size
3.1MB
-
MD5
6a0bb84dcd837e83638f4292180bf5ab
-
SHA1
20e31ccffe1ac806e75ea839ea90b4c91e4322c5
-
SHA256
e119fe767f3d10a387df1951d4b356384c5a9d0441b4034ddf7293c389a410b4
-
SHA512
d0d61815c1ca73e4d1b8d5c3ea61e0572bfa9f6e984247b8e66c22e5591d61f766c6476c2686ce611917a56f2d4d8b8ddb4efcdbed707855e4190a2404eedcc5
-
SSDEEP
49152:Ovkt62XlaSFNWPjljiFa2RoUYIUOzML6oGd4y/THHB72eh2NT:Ov462XlaSFNWPjljiFXRoUYIpzMG
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-