General

  • Target

    c1b7c826bcd46069430612557a69fdf0d99ee79015067c8f251bdc81df1d2c5c

  • Size

    1.0MB

  • MD5

    875733d4503afba3839d41811f71c8ec

  • SHA1

    412761df0d2cffb209613b4056e0f390e8fa4f45

  • SHA256

    c1b7c826bcd46069430612557a69fdf0d99ee79015067c8f251bdc81df1d2c5c

  • SHA512

    bae83526dc16bbc0f7182e0f54bc2c1d09f70fa8e0ca4d50cc91e512289222a2f5edf8ede9aac3f2a549e27ae11af10d9141add285ab525dfebd25e42c19aeac

  • SSDEEP

    24576:pLynkc1ZzBvtrZHFjMKY2BBOQMelwLocdZJO1:Zynkc1ZzBvtrZHFjMKY26QMelTcvJ

Score
10/10

Malware Config

Extracted

Family

quasar

Version

2.7.0.0

Botnet

skype Client

C2

workday2022.hopto.org:4788

Mutex

tFZudAoRJzMd4GUi9d

Attributes
  • encryption_key

    VHNFEuavwvOjvIgDRCya

  • install_name

    skype.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • c1b7c826bcd46069430612557a69fdf0d99ee79015067c8f251bdc81df1d2c5c
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections