General
-
Target
msgde.exe
-
Size
3.1MB
-
Sample
241227-gga9gsslet
-
MD5
c9536d9bb5c51fe2741cbf206531c13b
-
SHA1
5e4e1d68dd06301cf7810fa04589917aadfefad7
-
SHA256
1dff2a45e9861cdcb8741dd196123e32e2b9004b950ee21b9bacc9f99be14fdc
-
SHA512
e3bd730edd61ef54180ca004947cdcd1de88756ecec7f7f46f0a66702e5f271243ff096b0dc3c1e93621948745374fe996704078a64d23a7d049f424e754f5f7
-
SSDEEP
49152:avBt62XlaSFNWPjljiFa2RoUYI63RJ6TbR3LoGd/THHB72eh2NT:avr62XlaSFNWPjljiFXRoUYI63RJ6F
Behavioral task
behavioral1
Sample
msgde.exe
Resource
win7-20240708-en
Malware Config
Extracted
quasar
1.4.1
Office04
185.228.82.21:4782
59c47ccd-e59a-4ccb-933e-f1094e43684c
-
encryption_key
7CDE15C94B12183E5BC0673A57C6342C87E44E2A
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
msgde
-
subdirectory
SubDir
Targets
-
-
Target
msgde.exe
-
Size
3.1MB
-
MD5
c9536d9bb5c51fe2741cbf206531c13b
-
SHA1
5e4e1d68dd06301cf7810fa04589917aadfefad7
-
SHA256
1dff2a45e9861cdcb8741dd196123e32e2b9004b950ee21b9bacc9f99be14fdc
-
SHA512
e3bd730edd61ef54180ca004947cdcd1de88756ecec7f7f46f0a66702e5f271243ff096b0dc3c1e93621948745374fe996704078a64d23a7d049f424e754f5f7
-
SSDEEP
49152:avBt62XlaSFNWPjljiFa2RoUYI63RJ6TbR3LoGd/THHB72eh2NT:avr62XlaSFNWPjljiFXRoUYI63RJ6F
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-