General

  • Target

    5278d31fb56cb2c3c55fc8aa6ea9b4d1b32560fd348442476236016ce1991c8d

  • Size

    288KB

  • MD5

    255a0dba87086c2bd5073ecc6796488e

  • SHA1

    67047aadf53974c0b027c4b4278a5dc30525d736

  • SHA256

    5278d31fb56cb2c3c55fc8aa6ea9b4d1b32560fd348442476236016ce1991c8d

  • SHA512

    c88f65733deb8b400f9416f9f69b6bf7ba717b31f2b7ff4b553aee792e438b3cd85f92683c9fe9b117d9e79ca715c21b0819e7bb5e57ede5849b70e7dc9cf5aa

  • SSDEEP

    6144:0KJuiyEnCGnhJlMP5Kq+SMv0VGb7bDcllbkcC:nzCGL69zVGkllbkR

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.0.0

Botnet

Office04

C2

107.172.176.138:5556

Mutex

6o5s2DYjhR6zSjIIyY

Attributes
  • encryption_key

    gPm8k05MmnsEEyh3lOt7

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • 5278d31fb56cb2c3c55fc8aa6ea9b4d1b32560fd348442476236016ce1991c8d
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections