General
-
Target
VCGENERATOR.rar
-
Size
1.0MB
-
Sample
250102-xv8pxasjet
-
MD5
229be1f03d087484af49ee7dc7bebff8
-
SHA1
0ab0654db6c863957aad7411572253864040a37b
-
SHA256
8026bb6c85d3106c2e42ffae25c686b84869ad2aa498f645e7296d7681562e50
-
SHA512
c688e6665f5fe4a5ff79bcd2f6b6d1fae1754fa03a2eaf951e57b8e019c7ce7c75f7d7d66719245e00a59787368cc91a6a4b5ea686034a2216577d9a003c9943
-
SSDEEP
24576:cqxLFI+SFl8WcaFX5g0wEzfwZ6R9bXmOxC5oV85EfZEHWcP:cq+l86FX95fwZ6R9bXmOIl5EfZKWY
Behavioral task
behavioral1
Sample
VCGENERATOR/ELKAYSGENERATORFORVC.exe
Resource
win11-20241007-en
Malware Config
Extracted
quasar
1.4.1
PHOTON (VC)
68.9.130.235:5000
7def7a0b-7c21-4aa6-8287-626e35f99b65
-
encryption_key
924B0A7B7369598A14904A9651CD2598B3DE0717
-
install_name
VCGENV1.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
solara in yo pc
-
subdirectory
SubDir
Targets
-
-
Target
VCGENERATOR/ELKAYSGENERATORFORVC.exe
-
Size
3.1MB
-
MD5
20d5a38a42861505c7d525f824c67215
-
SHA1
9fbcf3ee11bfee1c6225e99f28d2d417c3b7b763
-
SHA256
9832cccc37c358584162d3c9df7238f6e27c39abcad58e10de0c0596a649bf57
-
SHA512
a4cdc5a52d3b317f0be5502f9a03db0662c78e7bcdcc716cf6455089769283612522d895893a951cdcfa87c8868020313364c82000ff714d12fab518086c9376
-
SSDEEP
49152:avkt62XlaSFNWPjljiFa2RoUYIWCD1JPLoGd4THHB72eh2NT:av462XlaSFNWPjljiFXRoUYIWCn
-
Quasar family
-
Quasar payload
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-