General

  • Target

    6413b46b839e53cd7eca27f925f7439321f5c7b50d204528b00546b9cf4eb837

  • Size

    3.1MB

  • MD5

    bb47e86745b64c55c469e2ad17516b47

  • SHA1

    b8661185e0af4569c881362fc0a10567c361f9b6

  • SHA256

    6413b46b839e53cd7eca27f925f7439321f5c7b50d204528b00546b9cf4eb837

  • SHA512

    c8840e504b20d4330ac4c99c35d8cf607f526f7ece3ece00fcf60a9fc0f7024c33b596847eea85f9f75ba0a1a3e744c24a9de2ba62c768649137de1580acf5e6

  • SSDEEP

    49152:uvKY52fyaSZOrPWluWBuGG5g5h/0Ha95bQDk/mLoGdzSTHHB72eh2NT:uv/52fyaSZOrPWluWBDG5g5hEaM

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

update

C2

127.0.0.1:4782

Mutex

ddb0d81d-667e-44c3-a1b7-00fcb82dd1ef

Attributes
  • encryption_key

    00DF680B0E09235E9256570DFF972BC701444E37

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    putty

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6413b46b839e53cd7eca27f925f7439321f5c7b50d204528b00546b9cf4eb837
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections