General

  • Target

    1516-63-0x0000000000400000-0x0000000000484000-memory.dmp

  • Size

    528KB

  • MD5

    37c58600485adcd9e636445a00328992

  • SHA1

    382ee367e736c09f72f6549c0e94399de20c10e0

  • SHA256

    1cd627124f0f31b689047acdcc32bf06abde97408f704c35f4609075cfe26f99

  • SHA512

    83053aee2f63ab0e2dbb5f8ac3204eaf2542cf7320c2367f9a4fcdb0734a578926c87510acbd6c7ff33d202861a8c7d29ac09b3d8cea4fd4e547fba9c7ef8a4e

  • SSDEEP

    6144:8TEgdc0YdebGbXOsA6j1RdhAN3CFWdq6jFmvXvcEDOb8F9zVYnzlciwdcTR3:8TEgdfYVA6S5+zpFVYnrwdcd

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

hplus20230325

C2

103.136.199.131:4782

158.247.227.231:4782

Mutex

17eb206f-a56e-4361-a18e-7ca16f3b99cc

Attributes
  • encryption_key

    3E9E141AD83C5BD6CE91880C0E256E15401EC674

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Google Chrome Updater

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1516-63-0x0000000000400000-0x0000000000484000-memory.dmp
    .exe windows x86


    Headers

    Sections