General

  • Target

    1260-49-0x0000000004B30000-0x0000000004B70000-memory.dmp

  • Size

    256KB

  • MD5

    4aa1c332b15f42f2ce66fc16a9a6a4dd

  • SHA1

    8217c9d23e10822038f740d7043e1d9741ac38ee

  • SHA256

    b41b1d5f75c16aa4626e2896cb2611a496efc834f1b1ea9c03ba68bfa658307c

  • SHA512

    03bd2cab590cfb6190a746ea0073e717b5acfe206aaaea280ec9fa63a13b25b37e0908f2c25a8ab4a6a806f508f7c63dd1ffd8510f089b8143b6bc082de81488

  • SSDEEP

    6144:K7zO0LSclT6FOwEP5Kq+SMv0VGb7bDcllbk7:wlJtTF9zVGkllbk7

Score
10/10

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    3000

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1260-49-0x0000000004B30000-0x0000000004B70000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections