General

  • Target

    3988-95-0x0000020C3D900000-0x0000020C3E0AE000-memory.dmp

  • Size

    7.7MB

  • MD5

    6426ef038911a2c6fb2edd4d28d41e62

  • SHA1

    4d8c7c5c319fbb4ac080419ede95d934a88920dd

  • SHA256

    56d51090bf2b5769828274214e28109f44e93d1b0f6d7487c1030c2d58a87517

  • SHA512

    c6fa13d92a3fd827b53ea060fffdb11265edbbef28e8dfb9afaeb22d50d5985323246513dd933ce1d1884ad14cdbf203b1fc57a8babdccc4bc27fc5b6b4414b2

  • SSDEEP

    98304:WMTF9ZOJnNElYtChKsvcTMxNCOg/xn4mnrcP6mQmuYShRzOD91qhQrGex/1bXg:RZ2tChxvVVgdxwymtuN3OD91ESdXg

Score
10/10

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    3000

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3988-95-0x0000020C3D900000-0x0000020C3E0AE000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections