General

  • Target

    673d00e17b1c798b0770b72aa0cce611.bin

  • Size

    180KB

  • MD5

    4548b1b2d4fe0d4e274173c2cfd00222

  • SHA1

    8f68f1acaff2b15a042613e89d168b5f2df0fb2a

  • SHA256

    844d0b7a36763467a9874b8ffcb11eb32f72b800f0dc810c08a920a727bec58d

  • SHA512

    90ecb5bc1f82e466fe03febfb8eb68e20d2caaff3e8d45d6234f694458c4c731123434ed1b8625b102670f4be5c6b843c82851fdd2190a04230f649ae55db206

  • SSDEEP

    3072:OmVWXtjabyOYOuJNFpIPzmlIGaP38i77RF7aeEKTbD9ANLpEpBgpNLjksWq0Z7g3:+XtjabMnr2PzHDUi77RFOeEhpRNL4sX/

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

2012 R2

C2

yolo23.line.pm:7176

Mutex

QSR_MUTEX_PakJ2aixyLRQbtKUOm

Attributes
  • encryption_key

    OavROXDJ4uP4rAMYbKmw

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • 673d00e17b1c798b0770b72aa0cce611.bin
    .zip

    Password: infected

  • 406547f8776aa23f90eab4e061c314de753e82d50384612b471b6bbb3c01e52e.exe
    .exe windows x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections