General

  • Target

    de12e80e3c73e42c3fd656d5dae906f0N

  • Size

    503KB

  • MD5

    de12e80e3c73e42c3fd656d5dae906f0

  • SHA1

    73038cb597ccfeec64baa3dddc05c42232c158fd

  • SHA256

    515ec08542e9f12e1fa3f77af62e55d1cd7df51037c7fe82be4566081d3576a4

  • SHA512

    18922a9534e4bd09c577fae858bb355ec2aeac06f38576806be1265ef44880f819d22e3ee744f468a8eb57df54c622f8c8e81b84ad09b252fa19e360c1a5d1e4

  • SSDEEP

    12288:pTEgdfYWxUyPPz+1TM4FywM1pVDReJicdP:qUw+PStywM1p5ReJicdP

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

GIAHUY

C2

14.225.254.32:9090

Mutex

18e8c78f-45c1-4c27-922e-e5c7c18bdf6f

Attributes
  • encryption_key

    677BA3CA93A14ED21921E76CDFAADEF9D4E79629

  • install_name

    svchosts.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Realtek

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • de12e80e3c73e42c3fd656d5dae906f0N
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections