General
-
Target
x.exe
-
Size
3.1MB
-
Sample
241217-g8bz4atpcm
-
MD5
ce560e01aa6d0a1848eacb577880f112
-
SHA1
ac6013ab7dec397c0f14368492047e5f54091f2c
-
SHA256
061f0c6e8d2aa06e218364b7d0f44e689d0c6b900a06844bf272efc516dabfdb
-
SHA512
988a405ec7c257c43e21ac721509478113c48ae5cdbfe25d7f0227a6ff473412ba662343365d4ca899fc621b6710437128505f29cb6939f45248ff255c4565ec
-
SSDEEP
49152:GvUt62XlaSFNWPjljiFa2RoUYI1EF3mMnAfvAoGd5THHB72eh2NT:GvI62XlaSFNWPjljiFXRoUYI1K3L
Behavioral task
behavioral1
Sample
x.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
su-pc
192.168.100.2:4444
47a88def-94f4-406d-86f5-8b0b767128df
-
encryption_key
6B74F0C858B7E90573D4E97997F2A082B9781250
-
install_name
x.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
x
-
subdirectory
SubDir
Targets
-
-
Target
x.exe
-
Size
3.1MB
-
MD5
ce560e01aa6d0a1848eacb577880f112
-
SHA1
ac6013ab7dec397c0f14368492047e5f54091f2c
-
SHA256
061f0c6e8d2aa06e218364b7d0f44e689d0c6b900a06844bf272efc516dabfdb
-
SHA512
988a405ec7c257c43e21ac721509478113c48ae5cdbfe25d7f0227a6ff473412ba662343365d4ca899fc621b6710437128505f29cb6939f45248ff255c4565ec
-
SSDEEP
49152:GvUt62XlaSFNWPjljiFa2RoUYI1EF3mMnAfvAoGd5THHB72eh2NT:GvI62XlaSFNWPjljiFXRoUYI1K3L
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-