General

  • Target

    Xworm.exe

  • Size

    3.1MB

  • MD5

    cf70d48d67373ccafdcf0dc9c5bfbccb

  • SHA1

    46a41c79e826d6ae68376376c3088f565805c5c7

  • SHA256

    c446a9ef895b4c910caf56fe33fcaa583bf1cf9340dc72b93ea4c5e69687d977

  • SHA512

    41dea7b3d023a8decf041016b4a748ba6c80f77d80391c86ea355311d7b27aa873baeb2c0ebc3df28640e3d9a50c486d04aca7acbdafc1f08af75f47f4539db8

  • SSDEEP

    49152:Iv5I22SsaNYfdPBldt698dBcjHTAR16ybR3GoGddTHHB72eh2NT:Iv622SsaNYfdPBldt6+dBcjHTAR16p

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Hawa Slave

C2

127.0.0.1:4782

having-bunny.gl.at.ply.gg:32381

Mutex

c043154e-c770-47c9-83a7-6cfcfe2e8a81

Attributes
  • encryption_key

    89EA4FFE5F728FABCCAA501D85497C89A98F95CB

  • install_name

    powershell.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    svchost

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Xworm.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections