General

  • Target

    Hyper-Stealer-Builder.exe

  • Size

    3.1MB

  • MD5

    c277050c99943c85e75a69b9a3898ee7

  • SHA1

    e99fcda426766f8ea39a5a1ce6c1529e74beae6c

  • SHA256

    0e5e6fd96f27666d8f4d1986265e85e1958f88302e4e6244f7ee8746bab42425

  • SHA512

    0b2b5f7836e14c23a830eb42028173c014b107db60989c93dc544d5cd79f191c963c88b7ca43f76dc368d07ef960a0f308d4c0b2070215e77c59ae41e004fbbd

  • SSDEEP

    49152:BvbI22SsaNYfdPBldt698dBcjHH7RJ6jbR3LoGd6THHB72eh2NT:Bvk22SsaNYfdPBldt6+dBcjHH7RJ6V

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

80.222.152.67:4782

Mutex

b1211cdc-e7ee-41df-a882-918ae7c97f3c

Attributes
  • encryption_key

    A684ADED669CF87DBFCB7333A13FCD58A8471D17

  • install_name

    HyperUD.exe

  • log_directory

    AppdataLog

  • reconnect_delay

    3000

  • startup_key

    Steam Client Webhelper

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Hyper-Stealer-Builder.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections