General

  • Target

    1a9fc6d523ce020286a56241c37badcf.bin

  • Size

    1.2MB

  • MD5

    4e1a0e1df39670cd89801947255b9bf4

  • SHA1

    d58be6e00aa72abfaed28e4fcace613ecb2df535

  • SHA256

    22d49f7329fb60fee6b0e67e0ca48934d0edc9a2e87bf30bf6af8b9fe232b878

  • SHA512

    07a4ab38d4942b0871dece06d0e55ae9a6c0839108471d72b5655c8acca8000d11759d11929365ce3d64f23b7e2ca313c46eed27b4b6aa578f0e8a7d4ece6efe

  • SSDEEP

    24576:rvYAetFQ/bHxeK/9TuE65StZi+R2+muHRVdMJXmGJJ78u22b:rgHFQ/boA0StZi6JbxHMJXmGJN320

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Yadu Desktop

C2

192.168.0.117:5952

Mutex

7c1aa5fc-2493-4922-84eb-b0c9e594a178

Attributes
  • encryption_key

    288DD8FDFEEFAB4F6D1AF0DB22F3D719A454FE7C

  • install_name

    Realtek.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Realtek Audio Manager

  • subdirectory

    Realtek Audio Manager

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1a9fc6d523ce020286a56241c37badcf.bin
    .zip

    Password: infected

  • 2f511d2b5082a059bbc56ddd78b3a2dbe221941f70b42d1e7740dbdcd4a5be12.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections