General
-
Target
asbdasb.exe
-
Size
3.1MB
-
Sample
250203-xreyeszmex
-
MD5
ccc57d21edec2c59a19ea5fe7ed1a943
-
SHA1
2a76498d6f373dbd6820b0d105a8a94ff47836ce
-
SHA256
7f50a9f5438fadc55d4e58f08e038a9b5c91616805adbaffc0a5d479ab3bea40
-
SHA512
9d11de6305fe4f6ddce088fcb8bc6b409e88a26392f956e6adb91c9ce1b2286834ffff246174c3cdf0c32408dbcb56b724b5e536bec21e7f187becfa58e225cf
-
SSDEEP
49152:Sv+I22SsaNYfdPBldt698dBcjHe/7571v+Lo7desTHHB72eh2NT:Svz22SsaNYfdPBldt6+dBcjHe/756
Behavioral task
behavioral1
Sample
asbdasb.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
rdtgtdrgfd-56277.portmap.host:56277
ccf570e8-30ac-4f23-9902-868025b6d01c
-
encryption_key
AB41F22B350F9B05BD105DBC654AA3C338A22A14
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
1
-
subdirectory
SubDir
Targets
-
-
Target
asbdasb.exe
-
Size
3.1MB
-
MD5
ccc57d21edec2c59a19ea5fe7ed1a943
-
SHA1
2a76498d6f373dbd6820b0d105a8a94ff47836ce
-
SHA256
7f50a9f5438fadc55d4e58f08e038a9b5c91616805adbaffc0a5d479ab3bea40
-
SHA512
9d11de6305fe4f6ddce088fcb8bc6b409e88a26392f956e6adb91c9ce1b2286834ffff246174c3cdf0c32408dbcb56b724b5e536bec21e7f187becfa58e225cf
-
SSDEEP
49152:Sv+I22SsaNYfdPBldt698dBcjHe/7571v+Lo7desTHHB72eh2NT:Svz22SsaNYfdPBldt6+dBcjHe/756
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-