General
-
Target
222.exe
-
Size
3.1MB
-
Sample
250116-axf2catkel
-
MD5
12f79c4859c66ba550b2b0a23421209c
-
SHA1
c9105f035bde2e0ff30df75b2be4b82f2c891a07
-
SHA256
5f8cd02b16b38230d9bef9d35052838ab3fd8e67bf2cfc82c89cd62d8eb9fca6
-
SHA512
810274c5bebdb31dcde9189b4d2874623ae1c82c457b7c3aa0f11d6718fb70568dba6ef0de4cac3e670596fb75179f822f4865113570710368880e221f84472c
-
SSDEEP
49152:Dvhuf2NUaNmwzPWlvdaKM7ZxTwLp+zYBxw/oGdyqTHHB72eh2NT:Dv8f2NUaNmwzPWlvdaB7ZxTwQzT
Behavioral task
behavioral1
Sample
222.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
10.0.0.85:4782
172.16.0.2:4782
192.168.56.1:4782
70b15695-83fa-49d5-9ab7-d6837c0bfe04
-
encryption_key
CE951E8DBE6E2FB19D206CC546AB1C2DB4750281
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
1
-
startup_key
Solara
-
subdirectory
SubDir
Targets
-
-
Target
222.exe
-
Size
3.1MB
-
MD5
12f79c4859c66ba550b2b0a23421209c
-
SHA1
c9105f035bde2e0ff30df75b2be4b82f2c891a07
-
SHA256
5f8cd02b16b38230d9bef9d35052838ab3fd8e67bf2cfc82c89cd62d8eb9fca6
-
SHA512
810274c5bebdb31dcde9189b4d2874623ae1c82c457b7c3aa0f11d6718fb70568dba6ef0de4cac3e670596fb75179f822f4865113570710368880e221f84472c
-
SSDEEP
49152:Dvhuf2NUaNmwzPWlvdaKM7ZxTwLp+zYBxw/oGdyqTHHB72eh2NT:Dv8f2NUaNmwzPWlvdaB7ZxTwQzT
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-