General

  • Target

    sus.exe

  • Size

    3.1MB

  • MD5

    40b9b1af42e85013341d3994eb9857ac

  • SHA1

    4cbaf05241707575b8bba65491e4771af3579b22

  • SHA256

    74bd2c08f9f127d8dbc5bf408568cdaf8f32b9afc9823abde3b6123b0da25c98

  • SHA512

    67480043dc18942b3895ca0914bb518fc865fa9a6669e1fba87b213c9c1b2939824c710b38a9f5a5e088c8b889f8022a4d467356e9c32ae231ab89cb36fa6c05

  • SSDEEP

    49152:mv/I22SsaNYfdPBldt698dBcjHKGxNESEyk/iILoGdz4THHB72eh2NT:mvQ22SsaNYfdPBldt6+dBcjHbxNm

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

niga

C2

192.168.0.106:4782

Mutex

d4922296-6b1c-4eb8-9900-8245ddd677af

Attributes
  • encryption_key

    ED126047C03399C2E91AEC0EB5284E8942B0414E

  • install_name

    asdkwk.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    kreiasad

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • sus.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections