General
-
Target
dac0e42cfa82a24f701aaf85aaf09fe6c429d7820b90a9050a381e5c540cb949.exe
-
Size
83.0MB
-
Sample
241220-hfmfssslbs
-
MD5
4117eceb35a8705eba8b0ed2148ad7d7
-
SHA1
1f0f47d0f8fc9f7d11467681473c563bf3624834
-
SHA256
dac0e42cfa82a24f701aaf85aaf09fe6c429d7820b90a9050a381e5c540cb949
-
SHA512
ad1fb197cf8fc7ebc536bd8787b655e8bd947e23ea64ad7a6da16238f5d4b4f8b3f0e30efc01ce0c0bc27f31dad1afdd97bb13aae3992a78e5214c7b761c4fe0
-
SSDEEP
393216:T4TPZVLWruiFVks+9j54GXvitZQLCO5SXDqQu58EISEhoIaE2FShABZDv25PPa2W:TKRVQxhu0P8Lq1LEvxOOx5Sk
Static task
static1
Behavioral task
behavioral1
Sample
dac0e42cfa82a24f701aaf85aaf09fe6c429d7820b90a9050a381e5c540cb949.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
Staking
51.15.17.193:4782
ff4f56ac-24e1-40ed-bb5c-e0b45b489ee4
-
encryption_key
97599F6E5D14A784CC4DD36B18A277119042FDA8
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
dac0e42cfa82a24f701aaf85aaf09fe6c429d7820b90a9050a381e5c540cb949.exe
-
Size
83.0MB
-
MD5
4117eceb35a8705eba8b0ed2148ad7d7
-
SHA1
1f0f47d0f8fc9f7d11467681473c563bf3624834
-
SHA256
dac0e42cfa82a24f701aaf85aaf09fe6c429d7820b90a9050a381e5c540cb949
-
SHA512
ad1fb197cf8fc7ebc536bd8787b655e8bd947e23ea64ad7a6da16238f5d4b4f8b3f0e30efc01ce0c0bc27f31dad1afdd97bb13aae3992a78e5214c7b761c4fe0
-
SSDEEP
393216:T4TPZVLWruiFVks+9j54GXvitZQLCO5SXDqQu58EISEhoIaE2FShABZDv25PPa2W:TKRVQxhu0P8Lq1LEvxOOx5Sk
-
Quasar family
-
Quasar payload
-
System Binary Proxy Execution: Regsvcs/Regasm
Abuse Regasm to proxy execution of malicious code.
-
Drops startup file
-
Executes dropped EXE
-