General

  • Target

    c3fbb3ebbdf80a8353d1e7b6a4d5a8ba13682dd174a71e007d7760758c43aece.exe

  • Size

    3.1MB

  • Sample

    250203-d97avaypg1

  • MD5

    9ed0669c1fe2cddd4eed6bedf9212693

  • SHA1

    63cb8ea01a0938bb77292116b4e5faed5618d19d

  • SHA256

    c3fbb3ebbdf80a8353d1e7b6a4d5a8ba13682dd174a71e007d7760758c43aece

  • SHA512

    c25e8c4a143a7a337ac53da2e15c6bb5b682d16ed6c9b6784fa99e7f0246f5c1d930ddba30b99cb58cf9ddaed96ea076756b42489c1971be30754c87d0b3a72c

  • SSDEEP

    49152:OvKI22SsaNYfdPBldt698dBcjH5HRJ6RbR3LoGdNZTHHB72eh2NT:Ovn22SsaNYfdPBldt6+dBcjH5HRJ6z

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

2025

C2

ducksro.DUCKDNS.ORG:5

Mutex

1b9237ca-608d-47fd-ae80-bba1f4ba0322

Attributes
  • encryption_key

    B61B5E36913EE1C537DD4B68B384FA4355C64906

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      c3fbb3ebbdf80a8353d1e7b6a4d5a8ba13682dd174a71e007d7760758c43aece.exe

    • Size

      3.1MB

    • MD5

      9ed0669c1fe2cddd4eed6bedf9212693

    • SHA1

      63cb8ea01a0938bb77292116b4e5faed5618d19d

    • SHA256

      c3fbb3ebbdf80a8353d1e7b6a4d5a8ba13682dd174a71e007d7760758c43aece

    • SHA512

      c25e8c4a143a7a337ac53da2e15c6bb5b682d16ed6c9b6784fa99e7f0246f5c1d930ddba30b99cb58cf9ddaed96ea076756b42489c1971be30754c87d0b3a72c

    • SSDEEP

      49152:OvKI22SsaNYfdPBldt698dBcjH5HRJ6RbR3LoGdNZTHHB72eh2NT:Ovn22SsaNYfdPBldt6+dBcjH5HRJ6z

MITRE ATT&CK Matrix

Tasks