General

  • Target

    BloxStrap v2.5.4.1.exe

  • Size

    3.1MB

  • MD5

    4fe3f16488126ea4b072fc6fcfc910b0

  • SHA1

    ba0b203f96f771e61d952ab925b773ac475a141b

  • SHA256

    52f9d1a2c3d4518da21b3426a0ccefb04e07316755f97de9eaaecc1e09c4b5c7

  • SHA512

    782a429364de283c8bda39c6f0ffc07847fe3d580a4f0280a9ccd75aeb6420280fe1d0b1a6e61cbd176d8f6fd331b50780c7f8239bff81b6eaf55ae647477697

  • SSDEEP

    49152:uvEt62XlaSFNWPjljiFa2RoUYIjyDHTmzopoGdSweTHHB72eh2NT:uvY62XlaSFNWPjljiFXRoUYIjyDHh

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.1.114:4782

Mutex

10d94abb-0198-407e-aa98-bb80c5b37835

Attributes
  • encryption_key

    45C885494447187E9FBAD6C4E1ACD4A1590FC706

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Runtime

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • BloxStrap v2.5.4.1.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections