General

  • Target

    5a8434f899549874f8114dda6a6e2763.bin

  • Size

    487KB

  • MD5

    04cf390094d8cdaec4e89a281056078c

  • SHA1

    bd2984feb021ae8ffa90a40400b8a91568a564c5

  • SHA256

    5ae5cbd5ef29c6386888ce1c5b15a44a07e27f6be64ca5c450d29745a2847e14

  • SHA512

    0da92d449b9c7dff1382b9c7723a9b5d964e2ffcaf27eb0651686992ea463426bf96e875840d866d23664a968d528e860921a50e1ec6762afefa50090487fd32

  • SSDEEP

    12288:IaHoqFlmRgUx2RiP+E1xNj8IVGeNCsXhU82mfGDZ8IHh4/V6Jui:I4uRO6+gecvXhU82mfG97Hh4oui

Score
10/10

Malware Config

Extracted

Family

quasar

Version

2.7.0.0

Botnet

Venom Client

C2

crazydns.linkpc.net:3000

Mutex

ER5Ojs5Por1j5joXR6

Attributes
  • encryption_key

    HHtj6qkHuyo7mzRB7Q0O

  • install_name

    Venom.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5a8434f899549874f8114dda6a6e2763.bin
    .zip

    Password: infected

  • 83006c24730b2d7fb7506451aee3d6bb85cc27d64e230630bc66517c7ba9ed21.bin
    .exe windows x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections