General

  • Target

    Executepls.exe

  • Size

    3.1MB

  • MD5

    cf5f3a510d9d1bbd0cbe31528cd5df9f

  • SHA1

    7d931968c0555d969bd0cc3a14521d7339fedc67

  • SHA256

    69c8c65ea548d549c5b2ca17c0a0ea37b9b88241b4459a8a754976031d6cb037

  • SHA512

    e660a6b17913385bcf0bdafce08606ab6f615ca1e554f5115fe451c42d32372ef1195e714c1cd9b5f0174c623a07d4c00c698a28a693bf955c127f4ba2f921d0

  • SSDEEP

    49152:6I6WGoyH0I6ZUI9IzkSr+PKbvtdpjhnto5tG4wL7sgAlD8CxV9s2cOtIv4oGQsTB:6I9Gdl6ZUI9Ut+PKcd5

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

WormBurry

C2

147.185.221.20:15467

147.185.221.20:38852

Mutex

3f51338a-d72d-4e94-99b7-62b8774bafb8

Attributes
  • encryption_key

    35D8C5468D502FD31B9068FF929210AF2F2ADC40

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Github.git

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Executepls.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections