General
-
Target
TestFile.exe
-
Size
3.2MB
-
Sample
250207-am2v3asjbx
-
MD5
cfa0c860a76a2cb8e15dcfe774097dc8
-
SHA1
4aeb7456b619f539e6f50cc8795d4e9307ff5317
-
SHA256
1ca88e53459076619192ce06bd6532599c399836e969df16d5724fb2af9652d7
-
SHA512
aebc2f8127c87b4a4f8ad57a3689bc5720db499fecadd751b3f683d3b7ccf68cb4dd2280fc09df835963e4aedb2ed512ca89f35cd2a48ce355595691a5c14aa1
-
SSDEEP
49152:YvAt62XlaSFNWPjljiFa2RoUYIiyfRlBx1ToGd3STHHB72eh2NT:Yvs62XlaSFNWPjljiFXRoUYIHR/H
Malware Config
Extracted
quasar
1.4.1
Office04
12.75.114.52:4782
d942a9a5-3785-41ac-a7db-12e8f1fb6c3d
-
encryption_key
E662E8B331BDD6D3B27E1C68FDDE49A9178AEBE8
-
install_name
A.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
TestFile.exe
-
Size
3.2MB
-
MD5
cfa0c860a76a2cb8e15dcfe774097dc8
-
SHA1
4aeb7456b619f539e6f50cc8795d4e9307ff5317
-
SHA256
1ca88e53459076619192ce06bd6532599c399836e969df16d5724fb2af9652d7
-
SHA512
aebc2f8127c87b4a4f8ad57a3689bc5720db499fecadd751b3f683d3b7ccf68cb4dd2280fc09df835963e4aedb2ed512ca89f35cd2a48ce355595691a5c14aa1
-
SSDEEP
49152:YvAt62XlaSFNWPjljiFa2RoUYIiyfRlBx1ToGd3STHHB72eh2NT:Yvs62XlaSFNWPjljiFXRoUYIHR/H
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-