General
-
Target
44.exe
-
Size
3.1MB
-
Sample
250210-djkddsyrhm
-
MD5
f57d584af554ff7a5af7f2e907575661
-
SHA1
98d2c4bd90fff59ea67e3112dc753a140cc3324a
-
SHA256
a3e14e4d2d7e379acd49b087d803e4651df001ee6596447a35f1afe23750df93
-
SHA512
1229c15dfb75164da3533613adeddd8b0916b6a36ebaf9c25932b998bc718ced042341fdc88270a635fba3905bbeac49acbc72f88d55ecffb8e9dacfb66ca839
-
SSDEEP
49152:ivkt62XlaSFNWPjljiFa2RoUYIbF73/QBxTLoGdTmcTHHB72eh2NT:iv462XlaSFNWPjljiFXRoUYIt3/ci
Behavioral task
behavioral1
Sample
44.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
clients4
193.143.1.121:9669
47e9495b-6eb3-43b3-87fd-6dee9f4b772a
-
encryption_key
B4A0A2EFBE8C22E116B4B6DCCD6B4CC8DB5CB9C6
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
OneDrive
-
subdirectory
SubDir
Targets
-
-
Target
44.exe
-
Size
3.1MB
-
MD5
f57d584af554ff7a5af7f2e907575661
-
SHA1
98d2c4bd90fff59ea67e3112dc753a140cc3324a
-
SHA256
a3e14e4d2d7e379acd49b087d803e4651df001ee6596447a35f1afe23750df93
-
SHA512
1229c15dfb75164da3533613adeddd8b0916b6a36ebaf9c25932b998bc718ced042341fdc88270a635fba3905bbeac49acbc72f88d55ecffb8e9dacfb66ca839
-
SSDEEP
49152:ivkt62XlaSFNWPjljiFa2RoUYIbF73/QBxTLoGdTmcTHHB72eh2NT:iv462XlaSFNWPjljiFXRoUYIt3/ci
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-