General

  • Target

    Server.exe

  • Size

    3.1MB

  • MD5

    89e0f8d71958e344d1071cab560dd305

  • SHA1

    f106a720d7b80d373bbe84792c53aab491a30924

  • SHA256

    136d4f11ca284be9615ee652f493d2e357d164091029286eee7b3350c2e7d4c3

  • SHA512

    4ae82e52ccb2a20b4781ef906edbfabf030c178b45eafe672f163ae668ce02cd20911f898ab5280bf75b66c241478715236da2edc5864b275504d14e35ec42ad

  • SSDEEP

    49152:SvyI22SsaNYfdPBldt698dBcjHQnhabRjPLoGdtaTHHB72eh2NT:Svf22SsaNYfdPBldt6+dBcjHQnhOT

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Hacked

C2

them-recommended.gl.at.ply.gg:37993

Mutex

145f9813-188a-4b62-ba7f-be07578e5a8f

Attributes
  • encryption_key

    9B76C981C0602003513D6F00F317713EF0E2A660

  • install_name

    Updater.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Updater

  • subdirectory

    Update

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Server.exe
    .exe windows:4 windows x86 arch:x86

    Password: XZXZXzxzX!1ee2e

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections