General

  • Target

    server.exe

  • Size

    3.1MB

  • MD5

    07dccd8779b74ad4a54626bcd2cb3bef

  • SHA1

    f433850738d4a26367da7596b73003200053362c

  • SHA256

    5800caf82a36637733bfcbf94ff7d84a94b9aed9219e379f8a7fd0fdb9ba2f65

  • SHA512

    4c9c9c9801f62fc8ad811e0e0f46eed808fb2085470f6ba82e1d8319f27459731ef8a77db8cc4be389c452816156bcdcf1a0e0e709b5559b0a072601e9f65cbc

  • SSDEEP

    49152:3vGlL26AaNeWgPhlmVqvMQ7XSKZoRJ64bR3LoGdZtTHHB72eh2NT:3vGL26AaNeWgPhlmVqkQ7XSKZoRJ6SJ

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

@123

C2

mother-amanda.gl.at.ply.gg:21734

Mutex

9e934c1b-08a6-4685-bb6a-de27a875f421

Attributes
  • encryption_key

    8E8D64935A72F87FC7C5AD95C61A6C59BC55CDA1

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • server.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections