General
-
Target
anotherport.exe
-
Size
3.1MB
-
Sample
241218-1rh7matpgr
-
MD5
886cbf1c76a1c72243b8b5b09d8130bf
-
SHA1
294ec2078c9d08f907f8c7bfb5559e5748949c9f
-
SHA256
af68c805613ad9d44fe9e4bc4ccd30ba8d374b6faf129a7210c6384416be3ef9
-
SHA512
afa34cbda23d4be19c8cb940f2708eee6c3eb67c98cf2a3264a8f6b33b7ed2989be150eb62ef396eaabd73105bd5be1ea3bdc5b5834d772e5342a5f3c083fc34
-
SSDEEP
49152:DvGI22SsaNYfdPBldt698dBcjH4Q8RJ6KbR3LoGdpKTHHB72eh2NT:DvL22SsaNYfdPBldt6+dBcjH4Q8RJ6k
Malware Config
Extracted
quasar
1.4.1
Axotrojan
193.161.193.99:46972
26f86d86-6a8f-46ae-bb91-fc1127efd3f6
-
encryption_key
4B13DC71783277444E966E1D66F9171ABFC15E88
-
install_name
Clientformyslut.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Axo startup
-
subdirectory
SubDir
Targets
-
-
Target
anotherport.exe
-
Size
3.1MB
-
MD5
886cbf1c76a1c72243b8b5b09d8130bf
-
SHA1
294ec2078c9d08f907f8c7bfb5559e5748949c9f
-
SHA256
af68c805613ad9d44fe9e4bc4ccd30ba8d374b6faf129a7210c6384416be3ef9
-
SHA512
afa34cbda23d4be19c8cb940f2708eee6c3eb67c98cf2a3264a8f6b33b7ed2989be150eb62ef396eaabd73105bd5be1ea3bdc5b5834d772e5342a5f3c083fc34
-
SSDEEP
49152:DvGI22SsaNYfdPBldt698dBcjH4Q8RJ6KbR3LoGdpKTHHB72eh2NT:DvL22SsaNYfdPBldt6+dBcjH4Q8RJ6k
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-