General

  • Target

    327bb4dfec8cfc425678b2a9afc6d592.bin

  • Size

    180KB

  • MD5

    e1ebd6638e20dac8f278c790a3ec080b

  • SHA1

    92733d8de1a73e6bfa4500b14e4d67e250f277b3

  • SHA256

    18a1c49e27acacb0379943c4c56dc0ebd37d7da351360435b6e94d14dc57cfee

  • SHA512

    44f99645c55540b4d3beffd42b3415b30c755edb68bf210ab069ee3d4cf86729aa6b91a268d9519ece2bdc8e04fcb11b91e8e45d0feb624e288becb198a5f6c2

  • SSDEEP

    3072:JEFoct+MX2G13vYf2vZaDDlfuFEdPLw6Wp9aROMeJMGxm4BdlOrhp:9BMG/2hWlWFaPLBROMWxLlO

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Office04

C2

cryptersandtools.ddns.com.br:5552

Mutex

QSR_MUTEX_PV7LCoiUmiwD1RBPCq

Attributes
  • encryption_key

    2yfSzdUNgSe9EVCk7VEH

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 327bb4dfec8cfc425678b2a9afc6d592.bin
    .zip

    Password: infected

  • 575a2f0d48c457c8dcc8d5ef5a964adbb50b48c7dda5d35592e1db58f8401a98.exe
    .exe windows x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections