General
-
Target
8a54d056aeda3294b96434794bfc06246f4d88585773b0da3fdd1aebdae80da4.exe
-
Size
348KB
-
Sample
250205-ejrm5syldt
-
MD5
f605752fad4e292cf6b1073e3ab590ee
-
SHA1
66c8734f3a6db32d1ab5b1ba5c3fc097423314fa
-
SHA256
8a54d056aeda3294b96434794bfc06246f4d88585773b0da3fdd1aebdae80da4
-
SHA512
6bb83996ebf34ef5a8567822148960aaceaaf8e76ce7981e589d98d79d1533189ba750da7b2b5eda147f24b27f90da1c26411e3949b385831b9360635b2ba6f3
-
SSDEEP
6144:4XNHXf500MYYSzKEQbcPKHeXMuvQK/ZzJzz7O:Gd504n1RvQKxtznO
Behavioral task
behavioral1
Sample
8a54d056aeda3294b96434794bfc06246f4d88585773b0da3fdd1aebdae80da4.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.3.0.0
Server
qjas.duckdns.org:55950
QSR_MUTEX_jgz2oEahB8s3KyEOO6
-
encryption_key
gj45F7I9UftmOOGvZded
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Google Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
8a54d056aeda3294b96434794bfc06246f4d88585773b0da3fdd1aebdae80da4.exe
-
Size
348KB
-
MD5
f605752fad4e292cf6b1073e3ab590ee
-
SHA1
66c8734f3a6db32d1ab5b1ba5c3fc097423314fa
-
SHA256
8a54d056aeda3294b96434794bfc06246f4d88585773b0da3fdd1aebdae80da4
-
SHA512
6bb83996ebf34ef5a8567822148960aaceaaf8e76ce7981e589d98d79d1533189ba750da7b2b5eda147f24b27f90da1c26411e3949b385831b9360635b2ba6f3
-
SSDEEP
6144:4XNHXf500MYYSzKEQbcPKHeXMuvQK/ZzJzz7O:Gd504n1RvQKxtznO
-
Quasar family
-
Quasar payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-