General
-
Target
minko.exe
-
Size
3.1MB
-
Sample
250123-hdctksxlaz
-
MD5
f58a18b8929f009586495b2607a8b806
-
SHA1
524c72a260cc4f80e2e4c92acad39aa16a05254c
-
SHA256
7dc1fd4a138be818ea68ea646718e202e386b0ed202108f6958309ff3455693c
-
SHA512
3c2449f8fbb9a19543163bb37bb8909208a45754ed317cdb7c8707b7bd3682c105e36712c070a8ec22217cc54b93cd042e834bbad076187455a8b4f0995b9c7f
-
SSDEEP
49152:Gvkt62XlaSFNWPjljiFa2RoUYIT59oCLNLoGdBhTHHB72eh2NT:Gv462XlaSFNWPjljiFXRoUYIT59bx
Behavioral task
behavioral1
Sample
minko.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
minko
192.168.1.104:4782
7f791aa9-cb89-4d49-8582-d2bee1e4c964
-
encryption_key
EDB1628352F4EB382035992E9E2540BB09AFD0AA
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Client
-
subdirectory
SubDir
Targets
-
-
Target
minko.exe
-
Size
3.1MB
-
MD5
f58a18b8929f009586495b2607a8b806
-
SHA1
524c72a260cc4f80e2e4c92acad39aa16a05254c
-
SHA256
7dc1fd4a138be818ea68ea646718e202e386b0ed202108f6958309ff3455693c
-
SHA512
3c2449f8fbb9a19543163bb37bb8909208a45754ed317cdb7c8707b7bd3682c105e36712c070a8ec22217cc54b93cd042e834bbad076187455a8b4f0995b9c7f
-
SSDEEP
49152:Gvkt62XlaSFNWPjljiFa2RoUYIT59oCLNLoGdBhTHHB72eh2NT:Gv462XlaSFNWPjljiFXRoUYIT59bx
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-