General

  • Target

    $vex-powershell.exe

  • Size

    3.1MB

  • MD5

    4d36b02764bde0103a6d0e4798f58e6b

  • SHA1

    dfd688682faf3e8b01396ac82d97ef1662acbe84

  • SHA256

    7dd60abc589c67aaeb8318b28896557f3ee182b66c12e016883bf75f06ce67c6

  • SHA512

    da7e8501fd61717daad59ee9540fb615a7aee9d774f5a4862184ff41359d65676614141b9c056db0e0041c7c4f7a5376751ebbc919e0e59692f1710a770c0460

  • SSDEEP

    49152:lvdI22SsaNYfdPBldt698dBcjHMvhobRjPdoGdXTPTHHB72eh2NT:lv222SsaNYfdPBldt6+dBcjHMvhIl

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

XenoVex

C2

even-lemon.gl.at.ply.gg:33587

Mutex

fb029cc1-15b5-4045-a498-9c354bd2499b

Attributes
  • encryption_key

    13B464E0B1FC18BBCC60086DCA7157CD2EF3CDDA

  • install_name

    $vex-powershell.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    $vex-powershell

  • subdirectory

    $vex-xenovex1

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • $vex-powershell.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections