General

  • Target

    r-c.exe

  • Size

    18.5MB

  • MD5

    1d6d97b36099b4e87dcd33a1a0adfed1

  • SHA1

    857dfa58a5f027d1db1e74ca1adfa3407ea544b8

  • SHA256

    54991e9a08dab7c7c46738227f2ff25f5f29f69f02e264cf7df4c7ea05a47d04

  • SHA512

    9d548846c0a922179118d3ce84bae03096314ea84294bc8ade7ec76e684c83d192b4eeb98bc0a6ca6a217eb9f936ae46f84937132574f6a42e7351794ec379ed

  • SSDEEP

    393216:fL/DWLqd8hEhdBe2TYNToMU7/g6Wv3CKsydLfe/HgM:HWed8qVe2TwMX+n3LfegM

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

new

C2

caidume1368.ddns.net:8848

Mutex

QSR_MUTEX_u4SGx4JeBWr8883ebl

Attributes
  • encryption_key

    o09xlLfQpDn3NCrvzrZV

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows MicroSoft Smart

  • subdirectory

    SubDir

Signatures

  • Detects Empyrean stealer 1 IoCs
  • Empyrean family
  • Quasar family
  • Quasar payload 1 IoCs
  • Detects Pyinstaller 1 IoCs
  • Unsigned PE 3 IoCs

    Checks for missing Authenticode signature.

  • NSIS installer 2 IoCs

Files

  • r-c.exe
    .exe windows:4 windows x86 arch:x86

    29b61e5a552b3a9bc00953de1c93be41


    Headers

    Imports

    Sections

  • Windows MicroSoft Smart.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • main.exe
    .exe windows:5 windows x64 arch:x64

    1e92fd54d65284238a0e3b74b2715062


    Headers

    Imports

    Sections

  • main.pyc