General

  • Target

    547679ede9037e0edceeaa3e10b5f9ba6b8af47e6a3fa38b825c769005f182ef

  • Size

    1.0MB

  • MD5

    289be5041440c4f1e1abeb0e3fb3eabc

  • SHA1

    16411711b6d4ee7172294355fb17b5e2ecb79056

  • SHA256

    547679ede9037e0edceeaa3e10b5f9ba6b8af47e6a3fa38b825c769005f182ef

  • SHA512

    5c9439ff4f96ffee948a749567ba82628f58cc988db70866bd6cb3e43ccadb0a29eaad78af7acdafceac468eebc99f8e4bb9a1d0dee64ebfc62a4c028f919827

  • SSDEEP

    24576:5Lynkc1ZzBvtrZHFjMKY270Nel0ooK+aRF:Jynkc1ZzBvtrZHFjMKY2wNel0E+a

Score
10/10

Malware Config

Extracted

Family

quasar

Version

2.7.0.0

Botnet

skype Client

C2

workday2022.hopto.org:4788

Mutex

HneL6mFIjFzW5i9NSb

Attributes
  • encryption_key

    ydPVSLKS9TTMlusE9ham

  • install_name

    skype.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • 547679ede9037e0edceeaa3e10b5f9ba6b8af47e6a3fa38b825c769005f182ef
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections