General

  • Target

    tmp

  • Size

    365KB

  • MD5

    cf78202c336e074c6a6b6a24d4ffa7f6

  • SHA1

    2bb0f0df01ebaaff322bd7fa89567bad6afe58c1

  • SHA256

    7aa071e2184478eb932bd815a0eb393fb5efd7b322e3d333b908a9d7d33a4186

  • SHA512

    cee91c70ebebf3920da195b9e053fa9222a97540d19f54581c068afa3e3219c0ce189263ccbe757e51b15da5ff869723dcecf464f2cf5201e7321435eecfb5b9

  • SSDEEP

    6144:90qQ4i1FFiEKARPUQbf2zomGlq6u+3ZwS9r:Wpli4Mg2zFGVu+pwS9r

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

hackee

C2

hacker.548848.xyz:1024

Mutex

QSR_MUTEX_sbRZ4pp7Rl7S5rtk9v

Attributes
  • encryption_key

    pfTF26HguPGkm7OH2YXI

  • install_name

    intelservice.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Intel CPU Service

  • subdirectory

    intelcpu

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • tmp
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections