General

  • Target

    620-93-0x0000000000210000-0x0000000000763000-memory.dmp

  • Size

    5.3MB

  • MD5

    04cd277d499a6e5179ec4b3dc4e05a41

  • SHA1

    7af1dd837c8bb74b37592e9463c74665dd188c4e

  • SHA256

    fbc96b22e64b418743e71c7d872e4ee199487b0c5a77c2ba7765b8bee8729dab

  • SHA512

    1096b4be040dbe9b4c3acfa7453447c263507f0de8c89d0f383686649c945cb4bf2ea6bc6a13550eddd5f08068f7232e82ac5ad65e90fff55ff4fe4a9bd9e1c8

  • SSDEEP

    6144:grNHXf500Mj+flkmY0/owCvobggvpVos5ZRg5X9:Kd50si70g1eBVospgp9

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Nov

C2

37.139.128.94:5000

Mutex

QSR_MUTEX_eZnYtXesrHquJP9u21

Attributes
  • encryption_key

    cnjVAVdqAEtq3rq2N0WD

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • 620-93-0x0000000000210000-0x0000000000763000-memory.dmp
    .exe windows x86


    Headers

    Sections