General

  • Target

    Linux-ExecutorV2.exe

  • Size

    3.1MB

  • MD5

    95895270e857b736d4c2daa4669b0ca8

  • SHA1

    4e20b5f0540d54edd4704b63aa15ed2ef779ddec

  • SHA256

    8874fdd51347fc53db76420c165583b3abb1c6ae433c62cfb5c1577d6babb60d

  • SHA512

    b8f97a963c3ea1cec95bf32fcafe66f9e0d332050ed51922875fa2decde24cb2b581341ae16d43da73bffba53b7c700f4f5f69e8114b2145e6df25572256227b

  • SSDEEP

    49152:uvNhBYjCO4Dt2d5aKCuVPzlEmVQL0wvwka7NRJ6NbR3LoGdlTHHB72eh2NT:uvtt2d5aKCuVPzlEmVQ0wvwf7NRJ6f

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Linux-ExecutorV2

C2

192.168.100.33:4782

192.168.100.33:1234

Mutex

d6bdea7c-dce5-4ca6-a0df-84a991576419

Attributes
  • encryption_key

    CA2ECEC332246DFF66C142E01B54DC45742DE362

  • install_name

    Linux-ExecutorV2.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    windowsecurity

  • subdirectory

    Linux

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Linux-ExecutorV2.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections