General
-
Target
9d07e30f2a7238a495be924fa99761dd7e0dd300ec310e7d2d457ad7e6959b36.exe
-
Size
3.1MB
-
Sample
250103-eea5laykgt
-
MD5
be32c281194c0a859cca202a418a16a3
-
SHA1
e2c3885c8bc9b24b492f68a2c69ebf0c488abebc
-
SHA256
9d07e30f2a7238a495be924fa99761dd7e0dd300ec310e7d2d457ad7e6959b36
-
SHA512
541266a8f6b23b74d40c9d2656adb963c92ed5f8f2f239aa472649958f934f29a37afd42dfe27e9dfc2991c529dc949bffb6766223593c9ff7418778ad9bd36f
-
SSDEEP
49152:HvnlL26AaNeWgPhlmVqvMQ7XSKKzDKkCWZLoGAVATHHB72eh2NT:HvlL26AaNeWgPhlmVqkQ7XSKKzDjp
Behavioral task
behavioral1
Sample
9d07e30f2a7238a495be924fa99761dd7e0dd300ec310e7d2d457ad7e6959b36.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9d07e30f2a7238a495be924fa99761dd7e0dd300ec310e7d2d457ad7e6959b36.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.4.1
Driver Host
VisoXC-59263.portmap.host:59263
80b8889c-1e9f-4330-a95e-a3d9faf3bfc4
-
encryption_key
C1589EF424F77018CD488E8307C8C1DF199C8A42
-
install_name
driverhost32.exe
-
log_directory
Driver Logs
-
reconnect_delay
3000
-
startup_key
driverhost32
-
subdirectory
Driver Host
Targets
-
-
Target
9d07e30f2a7238a495be924fa99761dd7e0dd300ec310e7d2d457ad7e6959b36.exe
-
Size
3.1MB
-
MD5
be32c281194c0a859cca202a418a16a3
-
SHA1
e2c3885c8bc9b24b492f68a2c69ebf0c488abebc
-
SHA256
9d07e30f2a7238a495be924fa99761dd7e0dd300ec310e7d2d457ad7e6959b36
-
SHA512
541266a8f6b23b74d40c9d2656adb963c92ed5f8f2f239aa472649958f934f29a37afd42dfe27e9dfc2991c529dc949bffb6766223593c9ff7418778ad9bd36f
-
SSDEEP
49152:HvnlL26AaNeWgPhlmVqvMQ7XSKKzDKkCWZLoGAVATHHB72eh2NT:HvlL26AaNeWgPhlmVqkQ7XSKKzDjp
Score10/10-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-