General
-
Target
Downloads.exe
-
Size
30.0MB
-
Sample
250331-aramday1e1
-
MD5
ec06a1b0ea6f4debdc9778b59b63ec30
-
SHA1
9d40cf615c4d9f4c21b892fa5506a8f852cb3e1d
-
SHA256
1942639c541470539b15b8fea26b1a02b2182ced0f42f22af143c5170bb01cc6
-
SHA512
d62b9c59d933cda1879fd00d997deb60b952c1573d385638306ecdfdb8604aae56fcc0437566818b688fa694769948b4b8cadcb33e7bce98e69f15f753d973b6
-
SSDEEP
786432:zuTAzEyI4EETMmFxGF3khP1kGYJh5WcR0SGnCP+W:Rf3QUGUPCJnWqDP+W
Static task
static1
Behavioral task
behavioral1
Sample
Downloads.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Downloads.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
quasar
1.4.1
Office04
102.41.58.213:5505
1e97a2db-0622-4c39-84ac-2f640c70aaf5
-
encryption_key
1F6CCF154B4C85A58D675CA9A482E9C7A041C879
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Extracted
asyncrat
0.5.8
Default
197.48.105.157:5505
41.233.14.164:5505
197.48.230.161:5505
102.41.58.213:5505
q0nJ1vo1fsSD
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Targets
-
-
Target
Downloads.exe
-
Size
30.0MB
-
MD5
ec06a1b0ea6f4debdc9778b59b63ec30
-
SHA1
9d40cf615c4d9f4c21b892fa5506a8f852cb3e1d
-
SHA256
1942639c541470539b15b8fea26b1a02b2182ced0f42f22af143c5170bb01cc6
-
SHA512
d62b9c59d933cda1879fd00d997deb60b952c1573d385638306ecdfdb8604aae56fcc0437566818b688fa694769948b4b8cadcb33e7bce98e69f15f753d973b6
-
SSDEEP
786432:zuTAzEyI4EETMmFxGF3khP1kGYJh5WcR0SGnCP+W:Rf3QUGUPCJnWqDP+W
-
Asyncrat family
-
Quasar family
-
Quasar payload
-
Async RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-