General
-
Target
jignesh.exe
-
Size
3.1MB
-
Sample
241216-hd24gaymd1
-
MD5
64da51697ac726c1e27f5d7899c89cac
-
SHA1
29f336e761644ff1bd932d5649b5275fd7fd79b3
-
SHA256
611f6deadda658b042a6636e5e69c381fa65ed5cab95d2e8f5e43c285ed3cfc7
-
SHA512
a4a123f0787b23a29c77ae6a3baa348cddbfe8b0232d0562982874462f49cf3ec4066356837780be8b3b516d640049b47e4cfea0e0659e37beed8f2265d92751
-
SSDEEP
49152:Wvht62XlaSFNWPjljiFa2RoUYISURJ6jbR3LoGddTHHB72eh2NT:WvL62XlaSFNWPjljiFXRoUYISURJ6V
Behavioral task
behavioral1
Sample
jignesh.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
Office04
98.51.190.130:20
11bbf22e-826e-486b-b024-adbd86228a9e
-
encryption_key
7A589EDBC6A581E125BF830EF0D05FC74BB75E30
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
ctfmon
-
subdirectory
SubDir
Targets
-
-
Target
jignesh.exe
-
Size
3.1MB
-
MD5
64da51697ac726c1e27f5d7899c89cac
-
SHA1
29f336e761644ff1bd932d5649b5275fd7fd79b3
-
SHA256
611f6deadda658b042a6636e5e69c381fa65ed5cab95d2e8f5e43c285ed3cfc7
-
SHA512
a4a123f0787b23a29c77ae6a3baa348cddbfe8b0232d0562982874462f49cf3ec4066356837780be8b3b516d640049b47e4cfea0e0659e37beed8f2265d92751
-
SSDEEP
49152:Wvht62XlaSFNWPjljiFa2RoUYISURJ6jbR3LoGddTHHB72eh2NT:WvL62XlaSFNWPjljiFXRoUYISURJ6V
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-