General

  • Target

    fontdrvhost.exe

  • Size

    3.1MB

  • MD5

    3aaaf4be968f7846cc3697959a6ba5ec

  • SHA1

    66c6de49521762033bc0f08d2fc2a18c2c678197

  • SHA256

    29f9003753e24d20e597b7c71661dadd221b011c9f14531e25e0bf1c55145123

  • SHA512

    6626e7e982e65c02fac4b9ae40f5f57e7bc4e79aaa08c9aa12d4b42f1fee0ca6449608972dbe19d634fe48cd8835f8fa5456780f62da143614b28a1f18489ecf

  • SSDEEP

    49152:fvve821/aQWl8P0lSk3aKA3Z+new/6BxyLoGd0qQTHHB72eh2NT:fvm821/aQWl8P0lSk3DA3Z+n5/5E

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

My VM

C2

server1.trustedvpnservices.com:13832

higradevpn.xyz:13832

Mutex

071e2576-e94a-492e-8303-baae1cb4641c

Attributes
  • encryption_key

    402F6F1B2F63357285F585A5880FBC2C0F468F55

  • install_name

    fontdrvhost.exe

  • log_directory

    CrashLogs

  • reconnect_delay

    3000

  • startup_key

    Usermode Font Driver Host

  • subdirectory

    C:\Windows\System32

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fontdrvhost.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections