General

  • Target

    Solara.exe

  • Size

    3.1MB

  • MD5

    bb25b87f0d78eb58be5fb7ac6221fc70

  • SHA1

    57cb6fa31127e0b260507a59f5f48207aa25bda6

  • SHA256

    cd7838194de3cc5ce85407eec4dc551cb4b4b2997a0eda7ca4921e6bff671022

  • SHA512

    0222aecb19f3f03ef57ed0e73d65f5b0ed195198bb867586749a966f8ac52d5408ec93dc7b674da6e17bae0e738017b87d71d72d9452f5782837058ca2507e42

  • SSDEEP

    49152:WvLI22SsaNYfdPBldt698dBcjHiFJ2z+aMfLoGQLTHHB72eh2NT:Wv022SsaNYfdPBldt6+dBcjHUUzY

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Solara

C2

192.168.2.7:4782

Mutex

ba289919-4af8-43d2-be0b-3679799e271e

Attributes
  • encryption_key

    5CB4194C3DC77CEBBAAFFDE65567F2110D147148

  • install_name

    Solara.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Solara.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections