General
-
Target
Client-built.exe
-
Size
348KB
-
Sample
241221-yfk6qsxpfz
-
MD5
492eb44f539caa20141bd7d84783d821
-
SHA1
6586778be19a5a4caf0e29b61cace38467ba7367
-
SHA256
44f270569724153f8cc32905397c86d5b37285b34b1ee0df31cd195b2fa4c74a
-
SHA512
a9e2528e54328cade71762185b221699e32b6c4f48c53562bfe950ee704395d399fdd757b4edb496bfb1b8694c69f6da153ce797c58dd9579d5774a86aed7a8f
-
SSDEEP
6144:xI6bPXhLApfp9CpZPBbinJjNKOOlr7H7PAGm:GmhApUZgnJIvH7PAGm
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.3.0.0
Meedo
2.tcp.eu.ngrok.io:8080
QSR_MUTEX_NQUsVoNfuuCMRLITRA
-
encryption_key
stf5wT9i1WRQevpAlPN0
-
install_name
win.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Runtime
-
subdirectory
Subdir
Targets
-
-
Target
Client-built.exe
-
Size
348KB
-
MD5
492eb44f539caa20141bd7d84783d821
-
SHA1
6586778be19a5a4caf0e29b61cace38467ba7367
-
SHA256
44f270569724153f8cc32905397c86d5b37285b34b1ee0df31cd195b2fa4c74a
-
SHA512
a9e2528e54328cade71762185b221699e32b6c4f48c53562bfe950ee704395d399fdd757b4edb496bfb1b8694c69f6da153ce797c58dd9579d5774a86aed7a8f
-
SSDEEP
6144:xI6bPXhLApfp9CpZPBbinJjNKOOlr7H7PAGm:GmhApUZgnJIvH7PAGm
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-