General
-
Target
098f75d091ae6473dce8b06216ab154737468869375e35e5949e39904dbe71e6
-
Size
3.4MB
-
Sample
250130-js2a6axkgk
-
MD5
8b2e0fa65ef1b87ffcc3ca43ddab5eb8
-
SHA1
89c584fa347a1e9b9caa3205f37b67d4bdf47fcc
-
SHA256
098f75d091ae6473dce8b06216ab154737468869375e35e5949e39904dbe71e6
-
SHA512
3d5eec18d870a104389e0e628e01ae3fdd372e65a3b7a0eb33fbc99965e3b6cd8e51cccf208041e0f6a3be55764286bf855e10c0792982cf458a8633ff29cbce
-
SSDEEP
49152:TvEuf2NUaNmwzPWlvdaKM7ZxTwR873dar7joGdyTHHB72eh2NT:Tvzf2NUaNmwzPWlvdaB7ZxTwS3S
Behavioral task
behavioral1
Sample
098f75d091ae6473dce8b06216ab154737468869375e35e5949e39904dbe71e6.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
winlogson
192.168.178.69:4782
coluich1220.duckdns.org:4782
a409f48d-fe2a-4207-b2c2-585b18fb47b3
-
encryption_key
4A886EE72F3932EB3311C152EDED110A81EF6553
-
install_name
winlogson.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
winlogson
-
subdirectory
winlogson
Targets
-
-
Target
098f75d091ae6473dce8b06216ab154737468869375e35e5949e39904dbe71e6
-
Size
3.4MB
-
MD5
8b2e0fa65ef1b87ffcc3ca43ddab5eb8
-
SHA1
89c584fa347a1e9b9caa3205f37b67d4bdf47fcc
-
SHA256
098f75d091ae6473dce8b06216ab154737468869375e35e5949e39904dbe71e6
-
SHA512
3d5eec18d870a104389e0e628e01ae3fdd372e65a3b7a0eb33fbc99965e3b6cd8e51cccf208041e0f6a3be55764286bf855e10c0792982cf458a8633ff29cbce
-
SSDEEP
49152:TvEuf2NUaNmwzPWlvdaKM7ZxTwR873dar7joGdyTHHB72eh2NT:Tvzf2NUaNmwzPWlvdaB7ZxTwS3S
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-