General

  • Target

    10fb9b71859bfc7ae5aff462a88ade70.bin

  • Size

    180KB

  • MD5

    3d55d02bb440a166db5661362b8e4d4f

  • SHA1

    73f2570b4872f1fb47ad37def23a3829d53442f1

  • SHA256

    693a95c5da78c75ee79e0c38dafc717a9b16089e05fb821c5310c48495834c38

  • SHA512

    92ed24722c87f472a8cc12cf56fd687992be444c1092a5ce3885201b93364e77dd850b4fa7de61a30190f0e98ddc2b31e5cf1a664c2cc9d56e4b60da2764f41d

  • SSDEEP

    3072:cvUddHboKcJAlWW8TN3Ba2r8OvhZuQAG9Cog0uDUGDfe0BWLh+VTEEyY+w:cvq1o3WsaOZuQAGkPUYfcLhAEEP

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

PROXY

C2

proxybreve.duckdns.org:4001

Mutex

QSR_MUTEX_l1M93VuqIyiH8hEQ4I

Attributes
  • encryption_key

    Z3lsDT6GRXRES92YFSq8

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    1

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 10fb9b71859bfc7ae5aff462a88ade70.bin
    .zip

    Password: infected

  • 451f300d14014ed0d89f00dde44295272d1672507a449a6106dc450493baa52e.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections