General

  • Target

    a760c4263a2d1e144c2fd116bf1351e1.bin

  • Size

    229KB

  • MD5

    d18983ed988e11f6bc61465248ac8c2a

  • SHA1

    69c08a36db31b18fa3543a681ff009fec32331fc

  • SHA256

    cb2efd76831c2dbf85368de55e298c290fa3d22f303745195c734ee4cf979c79

  • SHA512

    1ac6cfd32688efc12f091d076f9dee568b84a53f8e8ce1c369e7c0c3d79a7ece8a57fc4ca6c2085fd60ad24a53fde116931b4022c60235e03b59ceaf7f0bce41

  • SSDEEP

    6144:ZV9qTTh6IYxNTW0m2JDUQ2sysd/OFvbNNa+9A6:BvNTF9ysd/OFjTa+m6

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

BEOBEO

C2

222.253.182.185:9090

Mutex

b629c3f9-6e84-4b12-aa44-142bd48d26fe

Attributes
  • encryption_key

    E3F9325FDCF7CBE474DB678812431E432D3171B2

  • install_name

    Realtek HD Audio Universal Services.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Realtek

  • subdirectory

    Realtek HD Audio Universal Services

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a760c4263a2d1e144c2fd116bf1351e1.bin
    .zip

    Password: infected

  • 37fa30c9dcf255bda62c0a6b7f88a48263a3da18d18d8c66b1cbbc801077cfdf.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections