General

  • Target

    svchost.exe

  • Size

    3.1MB

  • MD5

    26959ef393fbd309059d5e43041c4fb6

  • SHA1

    c3ce55ccf75e8f505bc5ff0b3013a9ae54904b42

  • SHA256

    900e126e8d56ee42be9bf08c083366e7b4d1ce8d4764ab70e8c45f1fa73a75cd

  • SHA512

    8f87ac4586e538e7adf399eda06c7565e628baab961b23c11f5f4cf24c1439014c7d83f9725d3494910227f78074d0bc2899b9e35040f04a9f53bcc15700f03d

  • SSDEEP

    49152:Ov8t62XlaSFNWPjljiFa2RoUYITUZ3larzLoGdOTHHB72eh2NT:OvA62XlaSFNWPjljiFXRoUYIK3G

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

5.tcp.eu.ngrok.io:10972

Mutex

b028487a-6e45-4b66-9e91-3d4903e32b6c

Attributes
  • encryption_key

    91137B461EAD4C8D03DB7ED595191162855E87F2

  • install_name

    DRIVER32.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    DRIVER32

  • subdirectory

    SYSWOW

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • svchost.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections