General

  • Target

    d42771ad12332ddcc6e3ba3deee466eb21815ef3a0731a8927552e3bd02d8098

  • Size

    502KB

  • MD5

    05354911b5e25fe9c4a8a40518a3590d

  • SHA1

    3143a3f1253f558b7527738d5c9afad27e9e37dc

  • SHA256

    d42771ad12332ddcc6e3ba3deee466eb21815ef3a0731a8927552e3bd02d8098

  • SHA512

    755a7dbefb0f192a92fcc05dfc04ecc9264a7f8e8ebabb772a05a94c86a3a20546588f904e7aa362b3783cd25563058f1ddccec00d17d7a9677ea1aac5bf2550

  • SSDEEP

    6144:hTEgdc0YpXAGbgiIN2RSBpneqmIpi8Q5EtqN+yw4wUcE+Ob8F9/W+m5V4cTR3C:hTEgdfYlbgZeqFZ4Ayw+OpxhmT4cdC

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

m

C2

wallpaperengineu11.ddns.net:1444

Mutex

d39f304d-9e9c-4da7-9141-a17bb30d8fec

Attributes
  • encryption_key

    960D5ECAA953B88E52AFA5D54E6B2C61AC9AED6B

  • install_name

    svchost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    AudioRealtek(R)

  • subdirectory

    WallpaperEngine

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • d42771ad12332ddcc6e3ba3deee466eb21815ef3a0731a8927552e3bd02d8098
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections