General
-
Target
0x000300000001e767-21.dat
-
Size
3.1MB
-
Sample
250327-eyam6syr14
-
MD5
20eeb65678c6fcffcc30cc2fc429f572
-
SHA1
182305533e4a842da880cf204604456e838878db
-
SHA256
4266be83abea2867cfa44836d014983f658f688a1f96fe74bed4b2b5f0d59c1b
-
SHA512
f32cc7a2b5fde293bc9bb6e99c75b92d5725297f128a945f6edcb9ab4d6579ca388370bca5ddff1b5532d6b5e248641bf232a71af93aa031cb86097ed745a872
-
SSDEEP
49152:fveD/2oga6ctePEl3s3jn7HZkgyoRJ6ObR3LoGdPTHHB72eh2NT:fvY/2oga6ctePEl3s3L7HZkgyoRJ6I
Behavioral task
behavioral1
Sample
0x000300000001e767-21.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
Office04
epotiz-56104.portmap.host:56104
dff263c5-5f46-4ebd-b314-af4f281b1196
-
encryption_key
91AE6D01E5588CB2EC925069EE1425C401902592
-
install_name
Realtek HD Audio Manager.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Realtek HD Audio Manager
-
subdirectory
Realtek HD Audio Manager
Targets
-
-
Target
0x000300000001e767-21.dat
-
Size
3.1MB
-
MD5
20eeb65678c6fcffcc30cc2fc429f572
-
SHA1
182305533e4a842da880cf204604456e838878db
-
SHA256
4266be83abea2867cfa44836d014983f658f688a1f96fe74bed4b2b5f0d59c1b
-
SHA512
f32cc7a2b5fde293bc9bb6e99c75b92d5725297f128a945f6edcb9ab4d6579ca388370bca5ddff1b5532d6b5e248641bf232a71af93aa031cb86097ed745a872
-
SSDEEP
49152:fveD/2oga6ctePEl3s3jn7HZkgyoRJ6ObR3LoGdPTHHB72eh2NT:fvY/2oga6ctePEl3s3L7HZkgyoRJ6I
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-