General

  • Target

    1352-159-0x0000000000400000-0x000000000045E000-memory.dmp

  • Size

    376KB

  • MD5

    acc7f7dd0d6209e34b52ec205a83c05b

  • SHA1

    b698453cadc471702639d21a919679e1288ba28b

  • SHA256

    803ee51a10c9a069981806d21ce32138ca448093e8f911678c03bf0aa034c600

  • SHA512

    1be3954fe0cc679f0944ecba5079d048d2987d080bbaf62dda61923ce4455eb78000997d5640f268a6cd7b3532d2c78ecc9c70bab81feffd7bc0c17959f43406

  • SSDEEP

    6144:3rNHXf500Mj+flkmY0/owCvobggvpVos5ZRg5X2:7d50si70g1eBVospgp2

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Nov

C2

37.139.128.94:5000

Mutex

QSR_MUTEX_eZnYtXesrHquJP9u21

Attributes
  • encryption_key

    cnjVAVdqAEtq3rq2N0WD

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • 1352-159-0x0000000000400000-0x000000000045E000-memory.dmp
    .exe windows x86


    Headers

    Sections