General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
250201-vw7swsslcw
-
MD5
215a9fa05bcc5e8058ba6059df5a31bd
-
SHA1
9687de7a8d9a54a5d3bcf3df961b4b54295652fc
-
SHA256
8dfad053c59f61f99b65b3e48e81d29b392c1e7bd24dbd4a4799b8fa25111a46
-
SHA512
19b7446dc6125e2f1b7e036b40bc0ac5a144340a8f9226a03782f5a15706a309c378092e023ddf4574fad9a20cd30e6d3eb44395b1a1f4fb05392b82cb88b616
-
SSDEEP
49152:rvmI22SsaNYfdPBldt698dBcjHJqX0NmZ5LoGyi8XTHHB72eh2NT:rvr22SsaNYfdPBldt6+dBcjH4X0e
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
Office04
dragonbornwashere-43022.portmap.host:43022
d3a4bd6a-eb48-45c2-af96-7600c691081f
-
encryption_key
874DAD54C1F8000E0795D3F80C381F8EF9ABF5D4
-
install_name
Warp.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
WindowsHealth
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
215a9fa05bcc5e8058ba6059df5a31bd
-
SHA1
9687de7a8d9a54a5d3bcf3df961b4b54295652fc
-
SHA256
8dfad053c59f61f99b65b3e48e81d29b392c1e7bd24dbd4a4799b8fa25111a46
-
SHA512
19b7446dc6125e2f1b7e036b40bc0ac5a144340a8f9226a03782f5a15706a309c378092e023ddf4574fad9a20cd30e6d3eb44395b1a1f4fb05392b82cb88b616
-
SSDEEP
49152:rvmI22SsaNYfdPBldt698dBcjHJqX0NmZ5LoGyi8XTHHB72eh2NT:rvr22SsaNYfdPBldt6+dBcjH4X0e
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-