General

  • Target

    Venomsvchost.exe

  • Size

    1.0MB

  • MD5

    be6d7447d18007192ba365974e160806

  • SHA1

    b8c1f549f33fb0204cdeb94e17fd4ce91a148143

  • SHA256

    ca51c6261b2f90eb2bc7afe603bf658286584bd9fa6c2a128282807d382080ad

  • SHA512

    7461614844e5d582ce08cbf51c3b962cf5589843002553a6f00e7e07b6051c181c03ef8ff7ed75ebe25d337476e2906284923a66da721cf3487f339e084d18a9

  • SSDEEP

    24576:RCynkc1ZzBvtrZHFjMKY2IIZ2Lel8yJr6N9:8ynkc1ZzBvtrZHFjMKY2eLelFh6

Score
10/10

Malware Config

Extracted

Family

quasar

Version

2.7.0.0

Botnet

Venom Client

C2

soon-lp.at.ply.gg:17209

Mutex

BBzOWNzqu4259dixjr

Attributes
  • encryption_key

    GHujpjzt5ugVlRo71ld2

  • install_name

    svchost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

Signatures

  • Quasar family
  • Quasar payload 1 IoCs

Files

  • Venomsvchost.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections