General

  • Target

    xbatrat.exe

  • Size

    502KB

  • MD5

    1b99c3604d4eb55f98c6636b0ce14b65

  • SHA1

    28cd7c17f63e7b9648fca117c3ad4a05efb06066

  • SHA256

    e3b41c65b9ee28473b4487dc2879f7a2fe3ce33b52c1e4d351150a2f711c7026

  • SHA512

    6c2eca1c7bd21d954e51ee0dfe9989160bf1a1fbd04cf68b5260cadf55171346d1f4a6e20d951edf5cd4021999a60e3784d0e91268bc3725a5c95188b247ec23

  • SSDEEP

    6144:sTEgdc0YuXAGbgiIN2RSBxddqWU8M2MYMFsZ/wcETOb8F991AAZcTR3X:sTEgdfYsbgdHMILODpJAUcdX

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

xbatrattest

C2

70.70.19.220:4782

70.70.19.220:4753

Mutex

5ffbb4f2-1bd6-4f75-92b6-cb1256f7a126

Attributes
  • encryption_key

    45C5892F7FC83E096480FE9D090E9A8D064D660F

  • install_name

    Javart.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Java

  • subdirectory

    Java48

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • xbatrat.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections