General
-
Target
PERM.exe
-
Size
3.1MB
-
Sample
250122-zcyhbsvpdk
-
MD5
b0dd954ceb8a6f5f328c999877c8aae8
-
SHA1
1a312b40a820e819f25ade7cbe633aad104855f3
-
SHA256
91317ced2f4f13e3a9e32d85481811ac7ec8a497057f5b103a9d13915df9bd04
-
SHA512
3b2c519990213dbff799849e244650024eb449d37f7124eb0d645cac6619bd3875e27b6446c6016a75fed3bf24e0f3aa252dbddc5a3652e0a3f376097c519fa7
-
SSDEEP
49152:3vyI22SsaNYfdPBldt698dBcjH4oDkE2Hqk/+FpoGdOTHHB72eh2NT:3vf22SsaNYfdPBldt6+dBcjH4oDXr
Behavioral task
behavioral1
Sample
PERM.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.115:4782
0d2a5ea8-389a-4ca3-80ef-f0a24450d17f
-
encryption_key
CEBBCD296E028BCC0E5B98A92D532CD6055F1E6C
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
PERM.exe
-
Size
3.1MB
-
MD5
b0dd954ceb8a6f5f328c999877c8aae8
-
SHA1
1a312b40a820e819f25ade7cbe633aad104855f3
-
SHA256
91317ced2f4f13e3a9e32d85481811ac7ec8a497057f5b103a9d13915df9bd04
-
SHA512
3b2c519990213dbff799849e244650024eb449d37f7124eb0d645cac6619bd3875e27b6446c6016a75fed3bf24e0f3aa252dbddc5a3652e0a3f376097c519fa7
-
SSDEEP
49152:3vyI22SsaNYfdPBldt698dBcjH4oDkE2Hqk/+FpoGdOTHHB72eh2NT:3vf22SsaNYfdPBldt6+dBcjH4oDXr
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-