General

  • Target

    SinfulSpoofer.exe

  • Size

    3.1MB

  • MD5

    077b84625de8f630b622ed151725ebd8

  • SHA1

    d39c4979e424f42b7143d2b41d6e00409ac10416

  • SHA256

    61ab43579080b8f581254ffc1bc1d38d8a2da8f2c1d9c7f483e2edd00117145a

  • SHA512

    598c46f86e72c768511c5d58d08a75ae0e57b3a989f6f3f04bb3ecdcee42353a94e8699174aeb4f228bf37abc890f462ee0edcf7017a88bebb321629fbc123b6

  • SSDEEP

    49152:Cvht62XlaSFNWPjljiFa2RoUYIKvooBxisoGdLTHHB72eh2NT:CvL62XlaSFNWPjljiFXRoUYIGoA

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

fasdasd

C2

2.tcp.ngrok.io:16241

Mutex

d6ac566a-6fde-440a-b17c-aa5d54d19e93

Attributes
  • encryption_key

    02C7E31FB83C81538B3B7AEA158F1FCCDC2B0FEA

  • install_name

    asdsdasd.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    SystEm32

  • subdirectory

    dasdasd

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • SinfulSpoofer.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections