General
-
Target
c.exe
-
Size
3.1MB
-
Sample
250102-kaqblstjes
-
MD5
b7626d89b385c029db4666f162c25d48
-
SHA1
3c0b0e61ca49c7e0d394f4936757403dc74bf3c8
-
SHA256
6498dbfa29de6a0caf8b1e099f7ec2676ef5b2ac0576f6bb324122e7a4162853
-
SHA512
9234c0895237433ec0ab0dfde4f9ec957816e453c2b0f0f106185ea40954e5a353a0762e5b88e4d603bbaf20748dab4aca60a7c2f745b33ff3b7248aab102ad2
-
SSDEEP
49152:Kvkt62XlaSFNWPjljiFa2RoUYIuARJ6obR3LoGdcgJTHHB72eh2NT:Kv462XlaSFNWPjljiFXRoUYIuARJ6Cj
Behavioral task
behavioral1
Sample
c.exe
Resource
win7-20240729-en
Malware Config
Extracted
quasar
1.4.1
Office04
38.242.241.140:4782
4b387528-97ec-466a-915c-099747a4eb75
-
encryption_key
E3FC55CEBE0920BC04F0B9E76DF59B61B3B7C9EA
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Essentials
-
subdirectory
SubDir
Targets
-
-
Target
c.exe
-
Size
3.1MB
-
MD5
b7626d89b385c029db4666f162c25d48
-
SHA1
3c0b0e61ca49c7e0d394f4936757403dc74bf3c8
-
SHA256
6498dbfa29de6a0caf8b1e099f7ec2676ef5b2ac0576f6bb324122e7a4162853
-
SHA512
9234c0895237433ec0ab0dfde4f9ec957816e453c2b0f0f106185ea40954e5a353a0762e5b88e4d603bbaf20748dab4aca60a7c2f745b33ff3b7248aab102ad2
-
SSDEEP
49152:Kvkt62XlaSFNWPjljiFa2RoUYIuARJ6obR3LoGdcgJTHHB72eh2NT:Kv462XlaSFNWPjljiFXRoUYIuARJ6Cj
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-