General
-
Target
1250343116e00d7d7125b738253aeba67e40f0f9ab649bc6a4161580f824819b
-
Size
3.1MB
-
Sample
250101-yq6kes1pew
-
MD5
3c7bf1e80abf4d7d6dc60e207425f519
-
SHA1
9c65bc3a1688b64032ba3ef8cb5676cacfa34759
-
SHA256
1250343116e00d7d7125b738253aeba67e40f0f9ab649bc6a4161580f824819b
-
SHA512
a6d7e20fa6340e18470442a10a84e79442185c2e26939e6742cb7bc5f08acec27a50172a47b4cf2f8cce816cade61a60f127430cd8f25174bb98885b67f30663
-
SSDEEP
49152:CvDI22SsaNYfdPBldt698dBcjHZu/kBxnLoGdhTHHB72eh2NT:Cv822SsaNYfdPBldt6+dBcjHk/g
Behavioral task
behavioral1
Sample
1250343116e00d7d7125b738253aeba67e40f0f9ab649bc6a4161580f824819b.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.176:4782
8ac8cfe4-abbd-4c20-8ef9-30391cf64a5b
-
encryption_key
B236022E1D7BEC08D8EF90B6C25D471BFC7F95CB
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
1250343116e00d7d7125b738253aeba67e40f0f9ab649bc6a4161580f824819b
-
Size
3.1MB
-
MD5
3c7bf1e80abf4d7d6dc60e207425f519
-
SHA1
9c65bc3a1688b64032ba3ef8cb5676cacfa34759
-
SHA256
1250343116e00d7d7125b738253aeba67e40f0f9ab649bc6a4161580f824819b
-
SHA512
a6d7e20fa6340e18470442a10a84e79442185c2e26939e6742cb7bc5f08acec27a50172a47b4cf2f8cce816cade61a60f127430cd8f25174bb98885b67f30663
-
SSDEEP
49152:CvDI22SsaNYfdPBldt698dBcjHZu/kBxnLoGdhTHHB72eh2NT:Cv822SsaNYfdPBldt6+dBcjHk/g
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-