General

  • Target

    ShellExperienceHost.exe

  • Size

    3.1MB

  • MD5

    66f2cd749924ebcd3cd4e8e6882b50de

  • SHA1

    9a188abd5c98c3fec2da7b9dd5fed1927a191164

  • SHA256

    017154018a7290c534578cdbb64110339cff0d69f1e40f89db8176681b47981d

  • SHA512

    7deb88001b59a7364099d014fa655d8dc23ef28c6b8d5cf3a111506dee08945e52f2e432e2583751484e87310a83b10aa08c7c3a8c5ab3f4080f149abfee0962

  • SSDEEP

    49152:Hv3hBYjCO4Dt2d5aKCuVPzlEmVQL0wvwka3mhEmzfSoGdOTHHB72eh2NT:Hvnt2d5aKCuVPzlEmVQ0wvwf3mhs

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

My VM

C2

myownvm.anondns.net:13832

37.120.141.165:13832

Mutex

071e2576-e94a-492e-8303-baae1cb4641c

Attributes
  • encryption_key

    402F6F1B2F63357285F585A5880FBC2C0F468F55

  • install_name

    ShellExperienceHost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Shell Experience Host

  • subdirectory

    drivers

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ShellExperienceHost.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections