General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
250116-atkkcstjep
-
MD5
09aeaab89c707b3844cf6360e21fc2c5
-
SHA1
9f594050887f3e9917643d88cfc0980867da2abd
-
SHA256
83e0d63d5121160a9251331b4555350971eaeadfa31387d1e996689cbcd6b877
-
SHA512
d5eefd2a16b733993a1ed1f3b4a28975ae3e8880a2090e3f70ad5337c748739ae312950dda95363eb6c6d6b324e97fec5a19b0d2feb357f119e38f0d9fcb03ec
-
SSDEEP
49152:avaY52fyaSZOrPWluWBuGG5g5hPiRJ6xbR3LoGdUTHHB72eh2NT:avv52fyaSZOrPWluWBDG5g5hPiRJ6T
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
10.0.0.85:4782
70b15695-83fa-49d5-9ab7-d6837c0bfe04
-
encryption_key
CE951E8DBE6E2FB19D206CC546AB1C2DB4750281
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Solara
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
09aeaab89c707b3844cf6360e21fc2c5
-
SHA1
9f594050887f3e9917643d88cfc0980867da2abd
-
SHA256
83e0d63d5121160a9251331b4555350971eaeadfa31387d1e996689cbcd6b877
-
SHA512
d5eefd2a16b733993a1ed1f3b4a28975ae3e8880a2090e3f70ad5337c748739ae312950dda95363eb6c6d6b324e97fec5a19b0d2feb357f119e38f0d9fcb03ec
-
SSDEEP
49152:avaY52fyaSZOrPWluWBuGG5g5hPiRJ6xbR3LoGdUTHHB72eh2NT:avv52fyaSZOrPWluWBDG5g5hPiRJ6T
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-