General

  • Target

    1220-58-0x0000000000400000-0x0000000000510000-memory.dmp

  • Size

    1.1MB

  • MD5

    0475b6a97b0c8930a12a9eec1c3fde2d

  • SHA1

    9d20064552e45a5ce9d33bad3529aa9dae9e8f68

  • SHA256

    624c2905e8324f57e5a33d513d73739e9d85b02a8663db716baecf90a5649b9f

  • SHA512

    928768eb8a70ec3cab9836f82f5742552e1203b2cb4f70efc064dc28213500633ddf7ee88bf05bf6642a978575980af7d1d7195f907105706fedd61bf6ba5971

  • SSDEEP

    24576:Eaynkc1ZzBvtrZHFjMKY2C76R9elgFtcVg:1ynkc1ZzBvtrZHFjMKY2YI9elwE

Score
10/10

Malware Config

Extracted

Family

quasar

Version

2.7.0.0

Botnet

Venom Client

C2

24.152.37.45:4782

Mutex

JlYM51eW4iZoFyLa2X

Attributes
  • encryption_key

    zuQJeNRoNR3ra4fWyosx

  • install_name

    Venom.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • 1220-58-0x0000000000400000-0x0000000000510000-memory.dmp
    .exe windows x86


    Headers

    Sections