General
-
Target
Awp.ggCRACKED.exe
-
Size
3.1MB
-
Sample
241219-l5tg7azmbv
-
MD5
b622196e254ed84e5b1f59f1aac2cfb1
-
SHA1
f77a050aaff00d2cc3da7f11fb35e0bd2c0338be
-
SHA256
1d55a256b3519b624f19c81a9b9f0477d8ad45a967f853e723a921194ee585f0
-
SHA512
5a525dda3785449a3770f98ce105bf83a417654537a70e6f8a4ddfcba938dffa029e11161d1ae64afed48e78e6bd3336777c97334c7c1a453e9e742506520fbf
-
SSDEEP
49152:rvyI22SsaNYfdPBldt698dBcjHBdLf1JlaoGdVTHHB72eh2NT:rvf22SsaNYfdPBldt6+dBcjHBdLQ
Behavioral task
behavioral1
Sample
Awp.ggCRACKED.exe
Resource
win7-20240708-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.19:4782
cbd5bb11-a5b0-4dee-8e4b-bb4f3dacc71d
-
encryption_key
17F9A06104A1A84BB74B1E617E0D5896149A2953
-
install_name
Solora.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Defender
-
subdirectory
SubDir
Targets
-
-
Target
Awp.ggCRACKED.exe
-
Size
3.1MB
-
MD5
b622196e254ed84e5b1f59f1aac2cfb1
-
SHA1
f77a050aaff00d2cc3da7f11fb35e0bd2c0338be
-
SHA256
1d55a256b3519b624f19c81a9b9f0477d8ad45a967f853e723a921194ee585f0
-
SHA512
5a525dda3785449a3770f98ce105bf83a417654537a70e6f8a4ddfcba938dffa029e11161d1ae64afed48e78e6bd3336777c97334c7c1a453e9e742506520fbf
-
SSDEEP
49152:rvyI22SsaNYfdPBldt698dBcjHBdLf1JlaoGdVTHHB72eh2NT:rvf22SsaNYfdPBldt6+dBcjHBdLQ
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-