General

  • Target

    1908-86-0x0000000004A90000-0x0000000004AD0000-memory.dmp

  • Size

    256KB

  • MD5

    f759b77617469afda584d8748bba413d

  • SHA1

    97f683526f2f15c8f8424998c75d1761fb0a5957

  • SHA256

    8e21afb4825e58dff3dceba11cfd36196ab938fd42c2b84bfabbb9ab9c750a51

  • SHA512

    1346abd0b3655e33d70dcf1c23e3367ebc73fa77a096c5e9fccc6710916705b3983d8e3e1b5f3cd568a9646e8159cf29e19000faf7333f7aa9ac7d0a796bf1e8

  • SSDEEP

    6144:YKJuiyEnCGnhJlMP5Kq+SMv0VGb7bDcllbkX:TzCGL69zVGkllbkX

Score
10/10

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    3000

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1908-86-0x0000000004A90000-0x0000000004AD0000-memory.dmp
    .exe windows x86


    Headers

    Sections