General

  • Target

    451f300d14014ed0d89f00dde44295272d1672507a449a6106dc450493baa52e.exe

  • Size

    348KB

  • MD5

    10fb9b71859bfc7ae5aff462a88ade70

  • SHA1

    3e6c00c0d6d443741216b79e7f500d927b4cb60a

  • SHA256

    451f300d14014ed0d89f00dde44295272d1672507a449a6106dc450493baa52e

  • SHA512

    7666023e2c63c8eff11fb02588636fc932c0f616323bfa2c4faf4a65ba0355ea18f70a0b12246ffeacd1d0b137dd2aa6085058c5503fff0187f377758add3491

  • SSDEEP

    6144:uvNHXf500M8wU2Kd6ab76s9BeSCck4kZ25t0CNO:0d50XKYK6cCcL5txO

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

PROXY

C2

proxybreve.duckdns.org:4001

Mutex

QSR_MUTEX_l1M93VuqIyiH8hEQ4I

Attributes
  • encryption_key

    Z3lsDT6GRXRES92YFSq8

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    1

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Detects Windows executables referencing non-Windows User-Agents 1 IoCs
  • Detects executables containing common artifacts observed in infostealers 1 IoCs
  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 451f300d14014ed0d89f00dde44295272d1672507a449a6106dc450493baa52e.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections