General

  • Target

    21c687309d44259a119b6695bfa7dac8.bin

  • Size

    1.2MB

  • MD5

    7a6c8b4eaa9432e4549a453951a6812d

  • SHA1

    0111cfd4ab493736d6ca902bafdde9078a5a2f70

  • SHA256

    615abddf8898f1dc3c08de3a51ca736f70e23a65d93a005f55a9368a4d30c65b

  • SHA512

    c6f6a8d28d582e3b93e21329748560a02fd8f2e5907e52a25ee56352426acc4bcbe8dddfb32cd1e3eb85a9338bcc0b9835f5592a8d64cbf0ea1379ec937f4f12

  • SSDEEP

    24576:LhbchGa3bMcR7vXfP8Pai1SyoXfk6houc9gIWMMdV4yAR3UE:LhuVtp38ii83hIqIYV4yU3UE

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.174.129:4782

Mutex

6f32bc27-b82b-47fa-bc73-4e37baf4a613

Attributes
  • encryption_key

    C7F72574BAC4D21027038342CF35587A52994C47

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • 21c687309d44259a119b6695bfa7dac8.bin
    .zip

    Password: infected

  • e3dc423684976ae02183ff7156153303f75d3961decb3215213faa46d0926c69.exe
    .exe windows x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections