General
-
Target
4c55655c8daeb51fb9592bfd3eb4e29e1a40fc89b13af090c52cbcd4b6390521.exe
-
Size
3.1MB
-
Sample
241218-cyhyfaync1
-
MD5
5c585cd5a2d292a0cb0be6b10cace921
-
SHA1
84b90137c36d741a4291aa22f4450c470ed9bd89
-
SHA256
4c55655c8daeb51fb9592bfd3eb4e29e1a40fc89b13af090c52cbcd4b6390521
-
SHA512
958c91d84c7e163fd473caf91363680347aa452aebdae76a4c01b39da790d003c20af6462bec3663c0208e8680ae2a9042fbc2c8ed8960e062dd51070fa39b27
-
SSDEEP
49152:avCI22SsaNYfdPBldt698dBcjHQCv1JSpoGdTvTHHB72eh2NT:avP22SsaNYfdPBldt6+dBcjHQCa
Behavioral task
behavioral1
Sample
4c55655c8daeb51fb9592bfd3eb4e29e1a40fc89b13af090c52cbcd4b6390521.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
Office04
tieumao1995-51127.portmap.io:51127
4119a2e0-4ae4-4843-8534-99af91a2475d
-
encryption_key
DF6316067206E09C1F85138FCEBD56F5D94BF6AE
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Startup
-
subdirectory
SubDir
Targets
-
-
Target
4c55655c8daeb51fb9592bfd3eb4e29e1a40fc89b13af090c52cbcd4b6390521.exe
-
Size
3.1MB
-
MD5
5c585cd5a2d292a0cb0be6b10cace921
-
SHA1
84b90137c36d741a4291aa22f4450c470ed9bd89
-
SHA256
4c55655c8daeb51fb9592bfd3eb4e29e1a40fc89b13af090c52cbcd4b6390521
-
SHA512
958c91d84c7e163fd473caf91363680347aa452aebdae76a4c01b39da790d003c20af6462bec3663c0208e8680ae2a9042fbc2c8ed8960e062dd51070fa39b27
-
SSDEEP
49152:avCI22SsaNYfdPBldt698dBcjHQCv1JSpoGdTvTHHB72eh2NT:avP22SsaNYfdPBldt6+dBcjHQCa
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-