General
-
Target
204a88d4a5da2b21a7282fcd548be2fed1ab02f297ac2f2483ffa6bf38c01f65
-
Size
3.1MB
-
Sample
240704-gv76dazgla
-
MD5
be300aead5cd8e32fc9dd20fd9e7705c
-
SHA1
06a78475e21027d024464579e01a30ef1f87ef6c
-
SHA256
204a88d4a5da2b21a7282fcd548be2fed1ab02f297ac2f2483ffa6bf38c01f65
-
SHA512
c342ba8a16308ecc0a2d1351ef37540586852535fd525cf25006fb9e68614fda006b8fce5ee872ebee082a722cdb479b8e61c88d09e2d7c0efaa212978fe264c
-
SSDEEP
49152:Wvkt62XlaSFNWPjljiFa2RoUYI1URJ6ObR3LoGdZTHHB72eh2NT:Wv462XlaSFNWPjljiFXRoUYI1URJ6I
Behavioral task
behavioral1
Sample
204a88d4a5da2b21a7282fcd548be2fed1ab02f297ac2f2483ffa6bf38c01f65.exe
Resource
win7-20240508-en
Malware Config
Extracted
quasar
1.4.1
Office04
172.20.10.2:4782
58c9d7ce-367b-46ee-a0dd-70acadaa8502
-
encryption_key
7D391C6FD1226D3B96AFC080317CBD4D6C3E6AFB
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows stereo
-
subdirectory
SubDir
Targets
-
-
Target
204a88d4a5da2b21a7282fcd548be2fed1ab02f297ac2f2483ffa6bf38c01f65
-
Size
3.1MB
-
MD5
be300aead5cd8e32fc9dd20fd9e7705c
-
SHA1
06a78475e21027d024464579e01a30ef1f87ef6c
-
SHA256
204a88d4a5da2b21a7282fcd548be2fed1ab02f297ac2f2483ffa6bf38c01f65
-
SHA512
c342ba8a16308ecc0a2d1351ef37540586852535fd525cf25006fb9e68614fda006b8fce5ee872ebee082a722cdb479b8e61c88d09e2d7c0efaa212978fe264c
-
SSDEEP
49152:Wvkt62XlaSFNWPjljiFa2RoUYI1URJ6ObR3LoGdZTHHB72eh2NT:Wv462XlaSFNWPjljiFXRoUYI1URJ6I
-
Quasar payload
-
Executes dropped EXE
-