General

  • Target

    1476-111-0x0000000000400000-0x0000000000484000-memory.dmp

  • Size

    528KB

  • MD5

    19ef166895e726d459e8ff753f0826f8

  • SHA1

    78377cb09d468aa6fa61e33cf241dedd9c1003d2

  • SHA256

    f46b2fd4bce36c48196a168aa29f9fba33df470addbcb4a7959d33a388fb847c

  • SHA512

    fa2135dd6191f720f8225a706d8e71f8e870f59233cb06ad498203f8c729f7e33c8a82ecbd4adc606c34caf77a5298b4e064531a7a6561f523cd89bc128f3cad

  • SSDEEP

    6144:ETEgdc0YtebGbXOsA6j1RdhM1scdpQ2JXVPv1XcEn9b8F9XjO+EDbni9BycTR3:ETEgdfYFA6LctT3CBO+8bi2cd

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

Pure____1

C2

sabifati.linkpc.net:4784

deli.mywire.org:4784

Mutex

3a359e52-00bd-4e3d-8201-985b53b0c176

Attributes
  • encryption_key

    78BC50021362B61652204981B13FE17E053A03F1

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • 1476-111-0x0000000000400000-0x0000000000484000-memory.dmp
    .exe windows x86


    Headers

    Sections