General
-
Target
273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678.exe
-
Size
3.1MB
-
Sample
250114-cyfs3stphy
-
MD5
21ce4cd2ce246c86222b57b93cdc92bd
-
SHA1
9dc24ad846b2d9db64e5bbea1977e23bb185d224
-
SHA256
273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678
-
SHA512
ff43fe890e30d6766f51922cfd1e9c36d312fd305620954fae8c61829f58d7361ae442bf9145339904eb6a88c2629c1e83f5b8a1d78ab0d13554cf6053d194f6
-
SSDEEP
49152:DvTI22SsaNYfdPBldt698dBcjHZqS71J/ioGdRTTHHB72eh2NT:Dvs22SsaNYfdPBldt6+dBcjHZqSOB
Behavioral task
behavioral1
Sample
273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
Office04
0.tcp.in.ngrok.io:14296
cc827307-beb6-456e-b5dd-e28a204ebd45
-
encryption_key
93486CAE624EBAD6626412E4A7DC6221B139DAA8
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678.exe
-
Size
3.1MB
-
MD5
21ce4cd2ce246c86222b57b93cdc92bd
-
SHA1
9dc24ad846b2d9db64e5bbea1977e23bb185d224
-
SHA256
273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678
-
SHA512
ff43fe890e30d6766f51922cfd1e9c36d312fd305620954fae8c61829f58d7361ae442bf9145339904eb6a88c2629c1e83f5b8a1d78ab0d13554cf6053d194f6
-
SSDEEP
49152:DvTI22SsaNYfdPBldt698dBcjHZqS71J/ioGdRTTHHB72eh2NT:Dvs22SsaNYfdPBldt6+dBcjHZqSOB
-
Quasar family
-
Quasar payload
-
Legitimate hosting services abused for malware hosting/C2
-