General
-
Target
pack.mcmeta
-
Size
109B
-
Sample
250119-s8hy7avmfl
-
MD5
43ccda95b5c701c0fcf59baee8f7e30f
-
SHA1
0e243064e052298ebb619297c4516886712246d0
-
SHA256
ec34f78b2ed8239bd50e0beb22c61ee72f9902f356aa964b5d83087386985c75
-
SHA512
a5ec7e401e6fcb6d988d2801a3fe162cd2aa98d3f626a9b20493d268d6b9868f1fb236d6b3f351ebff41be4569d74e1d85e527952fd401a0640bb154af8e834f
Static task
static1
Malware Config
Extracted
quasar
1.4.1
Office042
127.0.0.1:4782
4fdba42b-1529-4894-a5f2-8af35850b68c
-
encryption_key
95D889B5EA350B61B463513FC30DBCFBC48B664D
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
pack.mcmeta
-
Size
109B
-
MD5
43ccda95b5c701c0fcf59baee8f7e30f
-
SHA1
0e243064e052298ebb619297c4516886712246d0
-
SHA256
ec34f78b2ed8239bd50e0beb22c61ee72f9902f356aa964b5d83087386985c75
-
SHA512
a5ec7e401e6fcb6d988d2801a3fe162cd2aa98d3f626a9b20493d268d6b9868f1fb236d6b3f351ebff41be4569d74e1d85e527952fd401a0640bb154af8e834f
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-