General

  • Target

    OP Auto Clciker.exe

  • Size

    3.1MB

  • MD5

    487fa94d3cfd9b5450badc836ac43b31

  • SHA1

    3710c0ec6e1fc07f09917e16e49280d3ddd13a52

  • SHA256

    5ffbfb59b9d3cbc86f527beb5007fc3cfaa2c352b53e254e73fc746ad92310e0

  • SHA512

    b87f7e64584b2193274ea8ad2af4e9081e250daf6b93c8edcd365589d3b451fc2a28458af8ae83696dd80dfe5b3499cd4a1cf9207c91b757915492ebf946d1ab

  • SSDEEP

    49152:rvSI22SsaNYfdPBldt698dBcjHA+RJ6lbR3LoGdF2THHB72eh2NT:rv/22SsaNYfdPBldt6+dBcjHA+RJ631

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

OP Auto Clciker

C2

10.0.0.230:4782

Mutex

95d4255c-3f4d-45a2-8bac-392665eabf7d

Attributes
  • encryption_key

    974DCFEACA0B0CA8C5E7E74A007FFF9EF8439CDF

  • install_name

    OP Auto Clciker.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    OP Auto CLciker

  • subdirectory

    OP Auto Clciker

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • OP Auto Clciker.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections