General

  • Target

    0b8650214b8620cab46ec081c65240a8.exe

  • Size

    1.0MB

  • Sample

    210823-7gfjnqn196

  • MD5

    0b8650214b8620cab46ec081c65240a8

  • SHA1

    c831e277e42db175ebd8048d581ad30b0894b8ff

  • SHA256

    98ed685e58c13887c499cef7806acfd58d771bdcf95b60d8c7604fd500a466ba

  • SHA512

    628f751f37e981ebe4b42f2749736c87946b25a5393bdcaf8b6833a33c45eeed6f7c129d592d1a00e33d98d4b492338491db8ffca76d890679198af80b4214fa

Score
10/10

Malware Config

Extracted

Family

quasar

Version

2.7.0.0

Botnet

Venom Client

C2

127.0.0.1:4782

Mutex

JlYM51eW4iZoFyLa2X

Attributes
  • encryption_key

    QxER0BEHyGMmmCgQAMqX

  • install_name

    Venom.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

  • subdirectory

Targets

    • Target

      0b8650214b8620cab46ec081c65240a8.exe

    • Size

      1.0MB

    • MD5

      0b8650214b8620cab46ec081c65240a8

    • SHA1

      c831e277e42db175ebd8048d581ad30b0894b8ff

    • SHA256

      98ed685e58c13887c499cef7806acfd58d771bdcf95b60d8c7604fd500a466ba

    • SHA512

      628f751f37e981ebe4b42f2749736c87946b25a5393bdcaf8b6833a33c45eeed6f7c129d592d1a00e33d98d4b492338491db8ffca76d890679198af80b4214fa

    Score
    6/10
    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks