General
-
Target
196e2ae082841b1ab98dcfa445cf2704.exe
-
Size
3.1MB
-
Sample
250106-dsf3bsxjbn
-
MD5
196e2ae082841b1ab98dcfa445cf2704
-
SHA1
4af7f4bb970331ae1eb569100de98c93b61c5459
-
SHA256
c3e669b477d3e633bf336fc5d2506c86c8fc61b4d0be36fe2bbe3b361cf70a70
-
SHA512
b64cf310fc65954c4873889ce68bce0539435539d6ff017d8c0238ee829ec9fd5220398558f58e17e9154210856f245d94bd6bcf7780edf0aae6bed71958232e
-
SSDEEP
49152:Pv/lL26AaNeWgPhlmVqvMQ7XSK4tMK1J3SoGdOTHHB72eh2NT:PvNL26AaNeWgPhlmVqkQ7XSK4tMz
Behavioral task
behavioral1
Sample
196e2ae082841b1ab98dcfa445cf2704.exe
Resource
win7-20241023-en
Malware Config
Extracted
quasar
1.4.1
database
91.160.181.237:4782
91.160.181.237:4783
bcda0faa-47b1-4e7d-be7c-8ff6fbc69a61
-
encryption_key
65940F11374651C87E8131C4328E542AEFE6F05D
-
install_name
Runtime Broker.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Runtime Broker
-
subdirectory
Runtime Broker
Targets
-
-
Target
196e2ae082841b1ab98dcfa445cf2704.exe
-
Size
3.1MB
-
MD5
196e2ae082841b1ab98dcfa445cf2704
-
SHA1
4af7f4bb970331ae1eb569100de98c93b61c5459
-
SHA256
c3e669b477d3e633bf336fc5d2506c86c8fc61b4d0be36fe2bbe3b361cf70a70
-
SHA512
b64cf310fc65954c4873889ce68bce0539435539d6ff017d8c0238ee829ec9fd5220398558f58e17e9154210856f245d94bd6bcf7780edf0aae6bed71958232e
-
SSDEEP
49152:Pv/lL26AaNeWgPhlmVqvMQ7XSK4tMK1J3SoGdOTHHB72eh2NT:PvNL26AaNeWgPhlmVqkQ7XSK4tMz
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-