General

  • Target

    304034ca275b3be98d1b92d28a7ed71a.bin

  • Size

    488KB

  • MD5

    687a3bab6a3a20a166783803bb8c2a5f

  • SHA1

    67138fe94c70596d6d1a7650a6b649c4f90572fb

  • SHA256

    4492a8c1335a3be8cfc262b5beab0edf199348cb601961ed422e6e82d628b52d

  • SHA512

    c01ecfb0dc15271aa105a8ee59784f9953a4db6a502e311ab3229931e05498e5cdddde900317833fc5553d0dab95d85e4cbb0a4b148fe975f03fdfb6b7b22466

  • SSDEEP

    12288:SVqjBmw+AO1aqx6lEWTZAGKyrEgYZFDJ2rFZ:UqjkR1aYCZAGKuEjN2D

Score
10/10

Malware Config

Extracted

Family

quasar

Version

2.7.0.0

Botnet

Venom Client

C2

crazydns.linkpc.net:26134

Mutex

JlYM51eW4iZoFyLa2X

Attributes
  • encryption_key

    dRPxHr2NcM6jte8WN3KY

  • install_name

    Venom.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 304034ca275b3be98d1b92d28a7ed71a.bin
    .zip

    Password: infected

  • b7edc8206134842f1452de2fcc1604b40a078d75a2a56391fc5698aef9fc9240.exe
    .exe windows x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections