General

  • Target

    8a9fdfd577337a30ecb6828922d85096357982f072191e7080fbc346bf69cf4c

  • Size

    3.1MB

  • MD5

    1c0b009bb35820b68328ee74f4213865

  • SHA1

    da213773a4f12cec7133336168802328bfa82712

  • SHA256

    8a9fdfd577337a30ecb6828922d85096357982f072191e7080fbc346bf69cf4c

  • SHA512

    e8677bc0658c7310eda31be81023d87f3352ab4680a630cfe7c26453357e1f6296b14c6bf3125066401b940c200a4a86bf670f01e3a7add5aa3a2d575d04138b

  • SSDEEP

    49152:U1kd71pQvZwHvhWLj/yw2wJcGdWy3THHB72eh2NT:U1o71pQvZwHvhWLj1

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

test1A

C2

tugastealer.ddns.net:1234

Mutex

b7b37f6c-9f99-4db2-b761-db4476f2946e

Attributes
  • encryption_key

    ECA60C3D939EB52142F99DCA7FF6928168A4E26D

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    2500

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • 8a9fdfd577337a30ecb6828922d85096357982f072191e7080fbc346bf69cf4c
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections