General

  • Target

    1776-64-0x0000000000400000-0x0000000000484000-memory.dmp

  • Size

    528KB

  • MD5

    27bff989611a359cd78e431d70afe483

  • SHA1

    92e4c0a0ebb1e4675d936bf345ec27d8294ceb88

  • SHA256

    176eed5d4c2580f10c82bb313c80c755dd67027e9945b059edd684ae59dabdfe

  • SHA512

    99bebcf55a5272801a262661783b711894a075eac5bb92f7a545f0565966d283a5451feb12f9ed778c729cdcd5b60f55af308e6ddf95a5d12911ed077bc6c13f

  • SSDEEP

    6144:kTEgdc0YIXAGbgiIN2RSBSgQ1l4G/8hiaX2sd4OcEkVb8F9MOTo+cTR3:kTEgdfY6bgosG8CkLU6jM+cd

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

Office04

C2

37.120.210.219:9771

Mutex

cdc62cc3-297d-4baa-b514-fcd69f23b760

Attributes
  • encryption_key

    F6CA1DFF4431556F5D775676A4005D1B1ABD97F4

  • install_name

    Client.exe

  • log_directory

    quasar

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • 1776-64-0x0000000000400000-0x0000000000484000-memory.dmp
    .exe windows x86


    Headers

    Sections