General

  • Target

    intelservice.exe

  • Size

    348KB

  • MD5

    2f890b7ca2e7b4b24bb534c28e54d7cf

  • SHA1

    e8d9f966c18f10f1eff01478d41dabacd0300da5

  • SHA256

    92dde00e5a5426b5a20e9e9e87ea29c66c6ab7cd467cbe9a90bf971f2d21a6a7

  • SHA512

    666670b52d4113a4909cc27fb38b851c0066a74aa2bfe67bb906a0c1fffedffaf26bd8f4aa0371adea3c9e51917c1de27b3cde2ed05db56aad16f476a955f841

  • SSDEEP

    6144:60qQ4i1FFiEKDvLJavf52ibVcbVKglEb0ouAYyj9jZV293DIa:rpliTVOf56WBYylc3DIa

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

hackee

C2

20.205.140.63:1024

Mutex

QSR_MUTEX_5Tlo4RbwyDWBOOlMEb

Attributes
  • encryption_key

    zFGtr8G9lnuwN5OHbzbL

  • install_name

    intelservice.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Intel CPU Service

  • subdirectory

    intelcpu

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • intelservice.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections