General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
250105-hbev6avraw
-
MD5
d6edcd97a141f64fe46289bf6bbf3a8f
-
SHA1
8cd43e6311f3b62bfba522c25315d1e737d265e3
-
SHA256
d84cb257d1647aaf06f6cb154bc7bdd9e542751d3373dce4986b4a3712deed5d
-
SHA512
664fe3111b738f56ab36f27cd01a99386e75193b0bc9cc40782e6480a9117ed0e47f471c27b208d9a8cc5d667f8ccb14627273af87915f8953658a0744443885
-
SSDEEP
49152:OvVt62XlaSFNWPjljiFa2RoUYI2jSJ1JZQoGd6THHB72eh2NT:Ovn62XlaSFNWPjljiFXRoUYI2jS4
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.132:4782
87a4bbe1-6583-48dd-943b-4f569edd0b04
-
encryption_key
AA6FC0D7B31977C5D714222F90C7F94D36193E6F
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Discord
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
d6edcd97a141f64fe46289bf6bbf3a8f
-
SHA1
8cd43e6311f3b62bfba522c25315d1e737d265e3
-
SHA256
d84cb257d1647aaf06f6cb154bc7bdd9e542751d3373dce4986b4a3712deed5d
-
SHA512
664fe3111b738f56ab36f27cd01a99386e75193b0bc9cc40782e6480a9117ed0e47f471c27b208d9a8cc5d667f8ccb14627273af87915f8953658a0744443885
-
SSDEEP
49152:OvVt62XlaSFNWPjljiFa2RoUYI2jSJ1JZQoGd6THHB72eh2NT:Ovn62XlaSFNWPjljiFXRoUYI2jS4
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-