Resubmissions
09-02-2025 13:24
250209-qndgvsslbn 609-02-2025 12:28
250209-pnkqha1kcy 809-02-2025 12:23
250209-pkvraszpgm 809-02-2025 11:59
250209-n5tjaszlfr 809-02-2025 11:40
250209-ns8sfsyqbq 309-02-2025 11:29
250209-nls4esyqgs 809-02-2025 10:33
250209-mlys8svjcx 309-02-2025 13:39
250209-qx2k2ssqdwGeneral
-
Target
test.txt
-
Size
18B
-
Sample
250201-se1l5sxkht
-
MD5
5b3f97d48c8751bd031b7ea53545bdb6
-
SHA1
88be3374c62f23406ec83bb11279f8423bd3f88d
-
SHA256
d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b
-
SHA512
ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6
Static task
static1
Malware Config
Extracted
quasar
1.4.1
Office04
10.127.0.74:4782
5ac3c1a9-02ed-44a0-8756-608736e9ea7d
-
encryption_key
06E2210085C96FFF2079E2BB385DB2B954D581E2
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
test.txt
-
Size
18B
-
MD5
5b3f97d48c8751bd031b7ea53545bdb6
-
SHA1
88be3374c62f23406ec83bb11279f8423bd3f88d
-
SHA256
d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b
-
SHA512
ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-