General

  • Target

    tmp

  • Size

    2.8MB

  • MD5

    ec4951e9f2b1945815954fec161cf57a

  • SHA1

    8e9e6857a0251a89b9c43b650344fb4f1648fa76

  • SHA256

    d969fc2e15743d6d44f477907368f2ebc96cefba20a232861fc7337bfa938d75

  • SHA512

    596e28d3529be33483589973ac34410f574cd888bda74e1e24afb2a2de107af4e788e2a27648da3c4fe4db4f49184244ce6ccf50f480c95c8d252d541587ad15

  • SSDEEP

    49152:y/Cbs48/vm/XpRDVHFZuAzG5LfvUza32ehyfT36:y/Ob8/vm/XnDVHbs

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

X

C2

45.141.27.208:4780

127.0.0.1:4780

Mutex

d6e77ea9-bff7-4566-b4dd-f1be3c293c5e

Attributes
  • encryption_key

    57F667877C1FCDA6663E2FDAC6FB8CFDE3CEA957

  • install_name

    winx.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    winx

  • subdirectory

    sys

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • tmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections