General

  • Target

    70da0f06cb454d93d73583cda4ecd7e33fcf788d3ea4cec57aa06c00670bb682

  • Size

    1.0MB

  • MD5

    900b358bae3debc09bb157171edb91f5

  • SHA1

    e58598c90fde20a7fb64d5fe5b30201a17fa5a2e

  • SHA256

    70da0f06cb454d93d73583cda4ecd7e33fcf788d3ea4cec57aa06c00670bb682

  • SHA512

    ea2b9d60553f2df9bed2e2805faeebcc420f138efeca9aa48967d881b8bbc3abd917a9f32ecd897ddf852509f361c1a3290d59383f544eef2dac5d7b6d908c51

  • SSDEEP

    24576:dLynkc1ZzBvtrZHFjMKY2pOuwelFwdelEVVZR:1ynkc1ZzBvtrZHFjMKY2JwelFwkm

Score
10/10

Malware Config

Extracted

Family

quasar

Version

2.7.0.0

Botnet

skype Client

C2

workday2022.hopto.org:4788

Mutex

VKxQPbGULmnCVaZdPS

Attributes
  • encryption_key

    fJ82wl51AwYfauX9S4aN

  • install_name

    skype.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • 70da0f06cb454d93d73583cda4ecd7e33fcf788d3ea4cec57aa06c00670bb682
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections