General

  • Target

    107757f1dff112c1001868bf793e1260_NeikiAnalytics

  • Size

    3.1MB

  • MD5

    107757f1dff112c1001868bf793e1260

  • SHA1

    bf68ac223a71d8a2ad0f0c3099c0d523003186ae

  • SHA256

    5304d682d3d358fb9dd496f8a89711dea64135432d5d8436e8e2e17e5d20c40b

  • SHA512

    4ce398e40575a077e212a532bd3c3b0c9015f04b40d3926f1b09d3287b743ae7d7387d61e21ef1da891afbd78f8f697578bb56a3bc8c181f8807dcabeec4adde

  • SSDEEP

    49152:KvyI22SsaNYfdPBldt698dBcjH58F3lars8oGdsxj3THHB72eh2NT:Kvf22SsaNYfdPBldt6+dBcjHE32

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.1.103:4782

Mutex

328cfd67-3d6e-4729-a4c4-61d18cbe8484

Attributes
  • encryption_key

    23F6ED73D5016943C83842EEB7FEA313A6AC201A

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 107757f1dff112c1001868bf793e1260_NeikiAnalytics
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections