General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
250327-2cm3psyygw
-
MD5
c29f45e56a8e5440afaa649f1e487413
-
SHA1
c30566ac9bc7b419293b5491c34953098b348ac7
-
SHA256
66bc9a4e0f2a4227a412decc3fca0aac864ea03220afac1ec097d35635fd3160
-
SHA512
c6098347f261b69e8d9be58ba069d23e0049c6c5682940aa05c158b98db864d99ab86aebb3968ba3745b23d2f76ca13a707b4615fd4d80ff192704a500406e54
-
SSDEEP
49152:fvXI22SsaNYfdPBldt698dBcjHymxNESEVk/i/LoGdGTHHB72eh2NT:fvY22SsaNYfdPBldt6+dBcjHbxMD
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240729-en
Malware Config
Extracted
quasar
1.4.1
Skibdi
7.tcp.eu.ngrok.io:16233
53790885-f84e-49fe-b0f5-533bcec24786
-
encryption_key
3428C8CDB24FFC56DF6BBDDEC9905C3058F7B092
-
install_name
WindowsDefender.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
WindowsDefender
-
subdirectory
WindowsDefender
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
c29f45e56a8e5440afaa649f1e487413
-
SHA1
c30566ac9bc7b419293b5491c34953098b348ac7
-
SHA256
66bc9a4e0f2a4227a412decc3fca0aac864ea03220afac1ec097d35635fd3160
-
SHA512
c6098347f261b69e8d9be58ba069d23e0049c6c5682940aa05c158b98db864d99ab86aebb3968ba3745b23d2f76ca13a707b4615fd4d80ff192704a500406e54
-
SSDEEP
49152:fvXI22SsaNYfdPBldt698dBcjHymxNESEVk/i/LoGdGTHHB72eh2NT:fvY22SsaNYfdPBldt6+dBcjHbxMD
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-