General

  • Target

    Solara.V3.exe

  • Size

    3.1MB

  • MD5

    ed7ee066ccd2c8b4f79e033a6cce060b

  • SHA1

    2ca343061c62cacc50857d7e514062e6ab392c75

  • SHA256

    8f76633128b2e86a0fca0d152286efcf8e962bbb48efe83408133241fee6cc5d

  • SHA512

    510e1282603d8e14221f105b0d5c5c238065153ef4a4fd8a91f1771aaaa35d6184663b8b2996f46565b034081d2dc54aec499e6fbd5e493fce9f84135ff760b5

  • SSDEEP

    49152:CvyI22SsaNYfdPBldt698dBcjHQjILX7GeoGdhTHHB72eh2NT:Cvf22SsaNYfdPBldt6+dBcjHQMLX7F

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.87.77:4782

Mutex

d11f01e2-f047-4b1d-87d9-5ba9990ceadc

Attributes
  • encryption_key

    8D80748F4532F141468BEDFB0B416C2797D791C9

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Solara.V3.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections