General

  • Target

    AccountRipper.exe

  • Size

    3.2MB

  • MD5

    06cbc080be08dda4bfd5068eeb59c6b0

  • SHA1

    1bbda9c31d945429b53dd4784f0bf835e5c551df

  • SHA256

    e9b48dffda40e2f2f6172e36d5646e6779a4bb4a0692083f8db1408206b6636e

  • SHA512

    ee64e688544aaf5d5a444f5f0f3acabc6ac703ac49f4bf7858ae144b8f3e63348186e226ad7e8bb18b07fc0401f841e092588f2ef5602bb8d5d29179591f50a8

  • SSDEEP

    49152:6vAt62XlaSFNWPjljiFa2RoUYI0X0+bRSLoGdtTHHB72eh2NT:6vs62XlaSFNWPjljiFXRoUYI0X0T

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Proton

C2

212.154.101.132:3000

Mutex

1b3adac2-334a-4914-b42a-429f32ec011f

Attributes
  • encryption_key

    8738101E98DC472C5F4C9FE5E109DEF1CA883172

  • install_name

    Method.exe

  • log_directory

    Logs

  • reconnect_delay

    2

  • startup_key

    Java

  • subdirectory

    Proton

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • AccountRipper.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections