General

  • Target

    Client.exe

  • Size

    3.1MB

  • MD5

    11d5d3ec42006ef6f0f868284ea9e147

  • SHA1

    63babfce17067829398e78f31d214b404681e2b1

  • SHA256

    76edb4609513aa41e49c2595b07874c3d75adddeaa987a3940370806a0f33f8b

  • SHA512

    53b0702ae06eca6915a03d419aa8cb47c082305e9a1564475bc84376a02426b114261255d4ec2d5e9c43054b3b634c6d9859da8fd78c44ac66ac9ac5d3c2d2b1

  • SSDEEP

    49152:rvCI22SsaNYfdPBldt698dBcjHSxRJ6cbR3LoGdmTHHB72eh2NT:rvP22SsaNYfdPBldt6+dBcjHSxRJ6m

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

ratting-42498.portmap.host:42498

Mutex

e6e9aab0-f5fb-4ccf-8885-f0ea03a94a15

Attributes
  • encryption_key

    3C32E8A197B894DA5850A6B90D12684B40B6F314

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Discord

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • Client.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections