General
-
Target
457e291dc62946ab2dc1cb558ffca2e90e5ebbd4a27013c5a23930339aedb978_Sigmanly
-
Size
3.1MB
-
Sample
241225-pl9lvaspdw
-
MD5
87b488fc8f9760bc9182c32ef76be93c
-
SHA1
16c3c1c53963cfedb800515b70e27ca2b7dd79fd
-
SHA256
457e291dc62946ab2dc1cb558ffca2e90e5ebbd4a27013c5a23930339aedb978
-
SHA512
30397f8eaf6444502e7e69463463c759711030b0b0ce6812f64f48dee7be6d4ba212045544396ef9e603248bb71a5e4a312eb70a6e7b541161a18301003d089c
-
SSDEEP
49152:evQI22SsaNYfdPBldt698dBcjHaLA3qarWboGdmhIOTHHB72eh2NT:evt22SsaNYfdPBldt6+dBcjHN3c
Behavioral task
behavioral1
Sample
457e291dc62946ab2dc1cb558ffca2e90e5ebbd4a27013c5a23930339aedb978_Sigmanly.exe
Resource
win7-20241023-en
Malware Config
Extracted
quasar
1.4.1
Office04
43.138.147.74:4782
4b095ece-017a-46f8-874b-d1266394fa10
-
encryption_key
AB08BB6743A540F991F118F0E7BF74E3D06D95A1
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
457e291dc62946ab2dc1cb558ffca2e90e5ebbd4a27013c5a23930339aedb978_Sigmanly
-
Size
3.1MB
-
MD5
87b488fc8f9760bc9182c32ef76be93c
-
SHA1
16c3c1c53963cfedb800515b70e27ca2b7dd79fd
-
SHA256
457e291dc62946ab2dc1cb558ffca2e90e5ebbd4a27013c5a23930339aedb978
-
SHA512
30397f8eaf6444502e7e69463463c759711030b0b0ce6812f64f48dee7be6d4ba212045544396ef9e603248bb71a5e4a312eb70a6e7b541161a18301003d089c
-
SSDEEP
49152:evQI22SsaNYfdPBldt698dBcjHaLA3qarWboGdmhIOTHHB72eh2NT:evt22SsaNYfdPBldt6+dBcjHN3c
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-