General

  • Target

    62f2d7fd2d76bd778d6053a1653af3ed47af7b13c2380d0dfcb824e4611fb672

  • Size

    288KB

  • MD5

    9c8b7260632b4ebb3f9db944329cfb5f

  • SHA1

    82b5db2ae9527a1331a22fb58f7baef60e269cb6

  • SHA256

    62f2d7fd2d76bd778d6053a1653af3ed47af7b13c2380d0dfcb824e4611fb672

  • SHA512

    4edcf886486603ece2a635b5497f4783dc0f160c4afbe1b605ac12d996b818fcd4dc36c84b5b6861206563e328953c854cf7adf3b64768b055d6be81174beb3a

  • SSDEEP

    6144:pKJuiyEnCGnhJlMP5Kq+SMv0VGb7bDcllbkHC:4zCGL69zVGkllbki

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.0.0

Botnet

Office04

C2

136.243.111.71:4782

Mutex

SpOo8Q6AEzRRqkwVpB

Attributes
  • encryption_key

    BCO9WvfGkeG8BMceKIIi

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • 62f2d7fd2d76bd778d6053a1653af3ed47af7b13c2380d0dfcb824e4611fb672
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections