General

  • Target

    f7b9f44883cc004d34cd03dd739cbecccb3ff66824856d30dcdc31d6b5165aff.zip

  • Size

    1.2MB

  • MD5

    fc3f4a15cab8a7c0c1eb6e53e22785a8

  • SHA1

    b268f474f7bd8fc916a80c206a6d17d471a72257

  • SHA256

    d80e66bf2994f5b88cc8a69bc53f77066eb13fd42c1488ac91ea68f10edf4d21

  • SHA512

    324bed94499e156c1800b602e91d87ece58af838db6bb98c13d9634d1a3c752f6a8b0684d2c7607937ed23c0a24242f51fb59784671c14105314b06b1e2870f8

  • SSDEEP

    24576:DLwPZaaBul49Z+g/D+JBB7/xry8F3xJXeS6JKo:2IaKuBDKzrkcxJOS6JKo

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

thebest39393.ddns.net:8809

Mutex

1224f465-e32d-4085-9a02-731b542e4878

Attributes
  • encryption_key

    8BD2B58EA96EA698E3D164141109BBA2A69EE028

  • install_name

    Windows Defender.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Microsoft Services

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • f7b9f44883cc004d34cd03dd739cbecccb3ff66824856d30dcdc31d6b5165aff.zip
    .zip

    Password: infected

  • f7b9f44883cc004d34cd03dd739cbecccb3ff66824856d30dcdc31d6b5165aff.exe
    .exe windows x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections