General
-
Target
af12a0fe7ac38dc5fe35e9bc07e2c4e94b52fb895fde35991f77477519991562.exe
-
Size
85.2MB
-
Sample
241220-fdshxsznaw
-
MD5
157a22896cc610d6310a2fa0f4a13005
-
SHA1
5e62076cad33e22d62413264113627114cbc8887
-
SHA256
af12a0fe7ac38dc5fe35e9bc07e2c4e94b52fb895fde35991f77477519991562
-
SHA512
1eba39a21c01950a12e78582e99253a48b3984564c4826890a577b849abfde20f3012eeea4a0c972f94faa153ba6aef90af57b8d0762b0920cf6a940ccd86b75
-
SSDEEP
393216:34TPZVLWruiFVks+9j54GXvitZQLCO5SXDqQu58EISEhoIaE2FShABZDv25PPa25:3KRVQxhu0P8Lq1LEvxOOx5Sv
Static task
static1
Behavioral task
behavioral1
Sample
af12a0fe7ac38dc5fe35e9bc07e2c4e94b52fb895fde35991f77477519991562.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
af12a0fe7ac38dc5fe35e9bc07e2c4e94b52fb895fde35991f77477519991562.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.4.1
SenshiPepe
51.15.17.193:4782
3cedc6f6-6ab5-4aba-8d7d-5cda1b7ffa72
-
encryption_key
97599F6E5D14A784CC4DD36B18A277119042FDA8
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
af12a0fe7ac38dc5fe35e9bc07e2c4e94b52fb895fde35991f77477519991562.exe
-
Size
85.2MB
-
MD5
157a22896cc610d6310a2fa0f4a13005
-
SHA1
5e62076cad33e22d62413264113627114cbc8887
-
SHA256
af12a0fe7ac38dc5fe35e9bc07e2c4e94b52fb895fde35991f77477519991562
-
SHA512
1eba39a21c01950a12e78582e99253a48b3984564c4826890a577b849abfde20f3012eeea4a0c972f94faa153ba6aef90af57b8d0762b0920cf6a940ccd86b75
-
SSDEEP
393216:34TPZVLWruiFVks+9j54GXvitZQLCO5SXDqQu58EISEhoIaE2FShABZDv25PPa25:3KRVQxhu0P8Lq1LEvxOOx5Sv
-
Quasar family
-
Quasar payload
-
System Binary Proxy Execution: Regsvcs/Regasm
Abuse Regasm to proxy execution of malicious code.
-
Drops startup file
-
Executes dropped EXE
-