General

  • Target

    1240-143-0x0000000000400000-0x0000000000510000-memory.dmp

  • Size

    1.1MB

  • MD5

    0bdfe758887833459eb2c89328687cc2

  • SHA1

    d644b955b5586cc2f5ca8b83a3c3e0170a5cfd6f

  • SHA256

    e4f9a915b672ed06aa1f409af1f1ba0675bae4effc8ff72ffaa471ef44ef3435

  • SHA512

    2dbfebc7e9431292ef722685f7f7594fbddb15ad0577d654d3def65656e27520de1a2681291d4b9a761e0a6b6c194bd9e5b4541cc23f6ec169dd583f6adc3e49

  • SSDEEP

    24576:Eaynkc1ZzBvtrZHFjMKY2C76R9elgFtcVgR:1ynkc1ZzBvtrZHFjMKY2YI9elwE

Score
10/10

Malware Config

Extracted

Family

quasar

Version

2.7.0.0

Botnet

Venom Client

C2

24.152.37.45:4782

Mutex

JlYM51eW4iZoFyLa2X

Attributes
  • encryption_key

    zuQJeNRoNR3ra4fWyosx

  • install_name

    Venom.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • 1240-143-0x0000000000400000-0x0000000000510000-memory.dmp
    .exe windows x86


    Headers

    Sections