General

  • Target

    3d57b604db0023cc57de8f224ad5b211a0a5250de68671fc61c55e1b354ceb38

  • Size

    534KB

  • MD5

    56e0b329f07f5e571a59183e837c6113

  • SHA1

    d72f777ded579dcc64ce7c71dab78c04211cd7bd

  • SHA256

    3d57b604db0023cc57de8f224ad5b211a0a5250de68671fc61c55e1b354ceb38

  • SHA512

    86bc95c1778646fba94902b13334e33566787cd80700b2de81901780742ac985efc6bbc81ccf6441b61ade34b5fabffec57704f43951c7abee7883c6650aacb5

  • SSDEEP

    6144:q0CSRbKT1aQtImwdlVLghczqJhrow83lYN3/CL3ntlb43Y7cRDlWFbXoY8j0:q0hRatI4cm4wela3qDntaYgRDQhJo0

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

OG

C2

poer.whoamis.info:8080

Mutex

QSR_MUTEX_kTtNJhYiOMnk8P9W2f

Attributes
  • encryption_key

    ZXzphmvZbuoIuRJjZbAhgXCPd6sp5Ixd

  • install_name

    dllhost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    dllhost

  • subdirectory

    dllhost

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • 3d57b604db0023cc57de8f224ad5b211a0a5250de68671fc61c55e1b354ceb38
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections