General
-
Target
BypasserRunFirst.exe
-
Size
3.1MB
-
Sample
250208-s28ahasqdy
-
MD5
2c39f6ceea730bcfd551fb106fddf974
-
SHA1
5fbb018bd30429085f0309503901e04625a8847b
-
SHA256
7dcda14173a0d102d6a02d290cbba10bd8a70e689375700bf0f322ea500c11c2
-
SHA512
5a24f72f34170f3396524d062c4ae63c4f8ca6766783aeb730c063a8e8dff36a95f2054d45a3c9e0b5292818f70dc9bd7e2c65bb2f573537241d4f8c438fbbad
-
SSDEEP
49152:SvLlL26AaNeWgPhlmVqvMQ7XSKuiSg1J/VoGd0hTHHB72eh2NT:SvxL26AaNeWgPhlmVqkQ7XSKuiSO
Behavioral task
behavioral1
Sample
BypasserRunFirst.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.3.210:4782
66e2d8be-f2d1-430b-a858-bea567f34e0d
-
encryption_key
6DDF2A1446CC876583B8AB188D7732CB160FAE85
-
install_name
TemperSpoferByCapyLovers.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
BypasserRunFirst.exe
-
Size
3.1MB
-
MD5
2c39f6ceea730bcfd551fb106fddf974
-
SHA1
5fbb018bd30429085f0309503901e04625a8847b
-
SHA256
7dcda14173a0d102d6a02d290cbba10bd8a70e689375700bf0f322ea500c11c2
-
SHA512
5a24f72f34170f3396524d062c4ae63c4f8ca6766783aeb730c063a8e8dff36a95f2054d45a3c9e0b5292818f70dc9bd7e2c65bb2f573537241d4f8c438fbbad
-
SSDEEP
49152:SvLlL26AaNeWgPhlmVqvMQ7XSKuiSg1J/VoGd0hTHHB72eh2NT:SvxL26AaNeWgPhlmVqkQ7XSKuiSO
-
Quasar family
-
Quasar payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-