General

  • Target

    03504299.bin

  • Size

    488KB

  • MD5

    e5307cad6e5ace7c8052dc0ebd2b8251

  • SHA1

    dfdb6516588e12ed4a387e1564ef2fc7471bed0c

  • SHA256

    239931a7868b1e4268dd3a31a3ab68f8bc5fd610b8792e373c196b844519de68

  • SHA512

    06c0ba8f151300b98d98fd7cccb1bddf9f5eff0011cba12cca8aadf5cfe80d20b0a43c8e61251c1dc377f58abcf0e261e078d3e0001a67598827a08663439c21

  • SSDEEP

    12288:X/fPVkLwe0V7GElLRtXxgXLIFkVPCKjLYTG9KxaPqr+TCNN:XnPVzD1lL7B3+4G8rMu

Score
10/10

Malware Config

Extracted

Family

quasar

Version

2.7.0.0

Botnet

R2 Datacenter

C2

rick63.publicvm.com:6750

Mutex

Upe2L54wRGWWLe9wgP

Attributes
  • encryption_key

    0gXyBPPAvXHK4k58eHz8

  • install_name

    Venom.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 03504299.bin
    .zip

    Password: infected

  • eaffa2b674b3afc1110ddd54a2835ebe59ed686a564f256dccb40b3bac1010ca.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections