General

  • Target

    71df747a219eb7ec24e6da2599ad10fa13f9f16e486873b71ab0d40e24b05f2d

  • Size

    1.2MB

  • MD5

    39f8ec40e86c3612caa4f6188329de51

  • SHA1

    ac7bb56b869820e3a4f3d508da029b4ac98e39af

  • SHA256

    71df747a219eb7ec24e6da2599ad10fa13f9f16e486873b71ab0d40e24b05f2d

  • SHA512

    1787cbe13369e82dff6a93013c1041c075d1a0d25b88a11fe36fe4448fc4d751107f58de4eac50f8ffce754f87cf6ff2b1f17efe6a1f84ce903aff32dd1898d0

  • SSDEEP

    24576:RvfhL9IXpZsY/sWLM2NkQgxlxctdLNhYjIQcLaPrG091nSODfnrdFC+FvfDu:lhBOZsliJKQgVqdJhgfdrNjSODnZMKfC

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Long Leg

C2

twart.myfirewall.org:9792

Mutex

0235e291-5d04-4fa3-932c-869aeec51499

Attributes
  • encryption_key

    3145298725BA5E0DD56E87FFE3F8898EA81E6EDA

  • install_name

    workbook.exe

  • log_directory

    Logs

  • reconnect_delay

    6000

  • startup_key

    workbook

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 71df747a219eb7ec24e6da2599ad10fa13f9f16e486873b71ab0d40e24b05f2d
    .zip

    Password: infected

  • c5cb97fbe4243df1a99a9c82f44ad555f283fad9f4b15b791faebe5048c8fc99.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections