General
-
Target
RuntimeBroker.exe
-
Size
3.1MB
-
Sample
250401-tfmbkstqw6
-
MD5
a2f4860ad05a29d90e63f7a2f42dd1d9
-
SHA1
c4f6c99b7e6f895114c6e5303391f3839bc4ed7c
-
SHA256
545155733d81e6f53f8aaf0aa36ea26dcaf8d07ede5059a22b095050fd766c4c
-
SHA512
d9e82e2470cc95ebfb4eee7c466d16e52e1de2e8819b4a18b9edff476744b5cbf2233b966b22ff80cdbcf2557d704840e9aade9d83cfffa6680f54824dce3c37
-
SSDEEP
49152:rviG42pda6D+/PjlLOlg6yQipVA4mLmz9LoGdSTHHB72eh2NT:rvF42pda6D+/PjlLOlZyQipVA4my
Malware Config
Extracted
quasar
1.4.1
revershe
holefo2785-22820.portmap.host:22820
3292df4f-7857-466e-995d-33740d2e756e
-
encryption_key
14B98F14C8A2574E32B0396E72660E0C80B14AC2
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
RuntimeBroker
-
subdirectory
discord\Network
Targets
-
-
Target
RuntimeBroker.exe
-
Size
3.1MB
-
MD5
a2f4860ad05a29d90e63f7a2f42dd1d9
-
SHA1
c4f6c99b7e6f895114c6e5303391f3839bc4ed7c
-
SHA256
545155733d81e6f53f8aaf0aa36ea26dcaf8d07ede5059a22b095050fd766c4c
-
SHA512
d9e82e2470cc95ebfb4eee7c466d16e52e1de2e8819b4a18b9edff476744b5cbf2233b966b22ff80cdbcf2557d704840e9aade9d83cfffa6680f54824dce3c37
-
SSDEEP
49152:rviG42pda6D+/PjlLOlg6yQipVA4mLmz9LoGdSTHHB72eh2NT:rvF42pda6D+/PjlLOlZyQipVA4my
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-