General

  • Target

    tmp

  • Size

    3.1MB

  • MD5

    687b6a16c285674c7de967a9023d41cb

  • SHA1

    28ce08899f1875e237952d3e055f65082bff4114

  • SHA256

    11741d902df10297fc071cef065342d5b6658882592794814bf56dcb4851731b

  • SHA512

    b1e6ec8b8790d667d6df090d5f07e5d503db6b018ac6a47d043ae90ee9a53e64fc67169138c36087446417aa0dbf74bdc67dd5dba2959c70041681078f674596

  • SSDEEP

    49152:2vWI22SsaNYfdPBldt698dBcjHHfxNESEuk/iYLoGddRTHHB72eh2NT:2v722SsaNYfdPBldt6+dBcjH/xh2N

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Global

C2

212.ip.ply.gg:14487

xianxe.duckdns.org:4782

Mutex

d854e735-7aef-41e2-86cc-009793549d61

Attributes
  • encryption_key

    E09DEA91CC7D9386EA849B921AA8F1D59384498B

  • install_name

    svchost.exe

  • log_directory

    Logs

  • reconnect_delay

    1000

  • startup_key

    svchost

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • tmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections