Resubmissions
20-12-2024 23:11
241220-26q2fswrhj 10General
-
Target
Client-built.zip
-
Size
1.2MB
-
Sample
241220-26q2fswrhj
-
MD5
3f9efdb6a228d80e9359cb3cd3eb8f43
-
SHA1
42c11797817e399bace2b94de3d44a067ef03c7e
-
SHA256
319f3d6b92ec7d20d9920d1e9f2cc67a2ce689335a748746fe38f37a16868e4e
-
SHA512
1cf4355d110595861818e63798ef7e7c66f3d5244465c26ffafd95008434a8f256826f2c6e3534482896cbb97831b7212acf544dbd090519078d24da79fa530c
-
SSDEEP
24576:LdxFL0yVJ9EdVo5fznl2U8YIiCy9AoaWibhjeO88j6zC:xrlVKarl2UNVrixeOd6zC
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.14:4782
0c87075a-1709-4bbf-b370-fda5b6d1d98e
-
encryption_key
8964B598D8DCA54C855C6A0315930A7B1DEA3A38
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
40fa1552520311d0c0770ba34d964602
-
SHA1
02223b59b2a18f2c55fd94a2f4c2ed9a596790e0
-
SHA256
6c6c7f83572cc8b39070e23ff5d8b25da332e51e989d7b65d32f52bd7d86c2f9
-
SHA512
e1ed2fab4a401783dd942a1af20f682244a387fd898078f19eacbb1fea151e9b6667b8a447a7ef835352ff14b5ca27433c7bf2dd40c129c448a38b295c8b9677
-
SSDEEP
49152:uvyI22SsaNYfdPBldt698dBcjHgaZwGs6loGdtYCTHHB72eh2NT:uvf22SsaNYfdPBldt6+dBcjHgUwGsuu
-
Quasar family
-
Quasar payload
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-