General

  • Target

    322a3c2aa4b0771aa57a6e61f6aa16c8.bin

  • Size

    180KB

  • MD5

    c721b79bc82cd77120c5d5f589a953fb

  • SHA1

    6b8c86e72d79527b7c0f681166c676258559cafc

  • SHA256

    fffcded01924ea4dec75ed63eb3048e6cabd2a0f4ff5ca05696bdb5a8349e240

  • SHA512

    b6ca68d8b4ef084070ee68b068a07470c2ce0e18985426ca84b3e67df8aa217a40d360e6991087f86ef48d6c5f98f46158a4151f6bb2567a84b67142d6c00eae

  • SSDEEP

    3072:gHgQGKU1pSH6zSWWylQx1WBfOrCcCyNbVWMwxJWY+c0kG8naMr2fhGV+6U3:FhKU1p9zACBfOrCcC8WMw/0klaNJGV+R

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Server

C2

qskv.duckdns.org:54790

Mutex

QSR_MUTEX_6XfpSkPPY2I8TVLBjx

Attributes
  • encryption_key

    WCBFAOZJMKUgUzt9V3k6

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Google Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 322a3c2aa4b0771aa57a6e61f6aa16c8.bin
    .zip

    Password: infected

  • c7519512e0b882ab10bc5e0bcf8d0769bdd96c532443c700713c8ac570084acb.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections