General

  • Target

    2848-23-0x0000000004C30000-0x0000000004C70000-memory.dmp

  • Size

    256KB

  • MD5

    c248c17ee157911a38c0c408af9ea9e4

  • SHA1

    a0652b9fc8a76931969c96a4817d448fdcff9cf9

  • SHA256

    b051a7c13bb9a9b33a8f0fdb498b922274f2ee9143749c6def7f4be4bda15658

  • SHA512

    b3046428daa6fc00a553b4cf7bb67dd53ad21cf4978b7543e4c281aaa4c225bf64c0407d493df37b67c26ecd561e332276f8682801de0196352bb938f06521ae

  • SSDEEP

    6144:87zO0LSclT6FOwEP5Kq+SMv0VGb7bDcllbk+:ClJtTF9zVGkllbk+

Score
10/10

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    3000

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2848-23-0x0000000004C30000-0x0000000004C70000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections