General

  • Target

    5fdd6c98800622f50704162045b762f7.bin

  • Size

    1.2MB

  • MD5

    54d48fe22be9ed2cf16c6ca1285386b3

  • SHA1

    a5ee00bc50391fe36e55a7b7d0e084b12ca207ad

  • SHA256

    73b18e4bee67ba97af62109b28ac80c6a5bdc28639adff254d30af28043cffc4

  • SHA512

    458ebaa72cf9cb26e3ca508e13c395c27495b97f58b4fb5ec0624feaf1c351f9ce0e7b9ccd55b689100c4c63ce3f0c5ff94e407daf54ce7415f148bebe72d41a

  • SSDEEP

    24576:FsfGgaTVRBBI/jzmakCb0HR3fLNn/z1RHOW5cxr5AHE:FQGHT1BULwHRPLNn/z1gAHE

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.119.128:4782

Mutex

a5ba3f8c-934a-4695-ae86-264dc2480152

Attributes
  • encryption_key

    755AEBE916235914656E5B7950B529FD70F2F039

  • install_name

    English CPT.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    School Board Connection

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5fdd6c98800622f50704162045b762f7.bin
    .zip

    Password: infected

  • 88f244f1882d4be11fb49e7a367cd93d57f2bed658f573b4d51a277822d17840.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections