General

  • Target

    2008-56-0x0000000000400000-0x0000000000484000-memory.dmp

  • Size

    528KB

  • MD5

    1f0ba99312f55c17ca9e061a435589d7

  • SHA1

    59152a9dad9a23e3788a4eadbc3f5ecc1d5b4c7e

  • SHA256

    ad65454cf289a47026028d4c141a5e3e22b21bf70bd6610f7acc6557203225bf

  • SHA512

    36e85070a229328737482c683c5ff0b485290b8b6568886700083f84c2485817cb48aff7048ba49d689f137e4a4e27a41e9406853ce20577881287550b117126

  • SSDEEP

    6144:NTEgdc0YdebGbXOsA6j1RdhdQVtLwFQiTphDdiqsartEcEkgb8F9uNacTR3u:NTEgdfYVA6uVt+TPt3ruUDUocdu

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

newcrypt

C2

103.136.199.131:4782

158.247.227.231:4782

Mutex

973aa178-3f17-48ed-b33e-52dd11425768

Attributes
  • encryption_key

    3E9E141AD83C5BD6CE91880C0E256E15401EC674

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Google Chrome Updater

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2008-56-0x0000000000400000-0x0000000000484000-memory.dmp
    .exe windows x86


    Headers

    Sections