General

  • Target

    invoice.exe

  • Size

    502KB

  • MD5

    cb0a3c4192fa9951a38be2c9d191b650

  • SHA1

    225a5d67060e1cb0994186d123b40b660ce847a2

  • SHA256

    d2e68ba8dd6bb6ef672bc9ea88e18d66ab45acf4c9fa52cdbc785e4836067792

  • SHA512

    de47890581911868bb22b464b6e21e312d6fe5f16355e4a6467e70803716cfbcffc0a289521268fb6f0079f194a1e9bc3d5e2f81abe6df6d3637a01fc68cf38b

  • SSDEEP

    6144:sTEgdc0YvXAGbgiIN2RSBrj7PxdTEDcKUDkQfocE+Ob8F9/y4c6Qv+YscTR3a:sTEgdfYnbgfkQDkupp7Qv+Dcda

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

Office04

C2

54.84.208.91:58466

Mutex

265076ec-c2b6-4736-a130-5694ec26ff7e

Attributes
  • encryption_key

    8BD014E74BCCC0146FCB52C17951EDE81869B012

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • invoice.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections