General

  • Target

    3b91d7f0be55606bcdf71b37a18f34c298156b12181ff7c944fb7a1818916736N

  • Size

    7.6MB

  • MD5

    2b0f4ed458655cb0dbc66cf2a1f6a650

  • SHA1

    905121961d59b36a8eba46b02dcf9b48c68baae4

  • SHA256

    3b91d7f0be55606bcdf71b37a18f34c298156b12181ff7c944fb7a1818916736

  • SHA512

    1741a6881e9e9a24e8f4e50ee28dd9a00e47156ae987c4bd25348504dd669e2bd4f6685607275419dc7af42bbaa0ff53306a91bad892c2a508797a8fe9740fad

  • SSDEEP

    196608:IiyGR6yx+w3u7zPJKqCyBDpQyNCD+l7ggmdzrK:IiHR6yx5uJKqCyfnNCigPZO

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

new

C2

caidume1368.ddns.net:8848

Mutex

QSR_MUTEX_7rJKh7823LOXhq62Ll

Attributes
  • encryption_key

    XOrsMOPj48itZ7EYR3g9

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    System

  • subdirectory

    SubDir

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 2 IoCs

    Checks for missing Authenticode signature.

  • NSIS installer 2 IoCs

Files

  • 3b91d7f0be55606bcdf71b37a18f34c298156b12181ff7c944fb7a1818916736N
    .exe windows:4 windows x86 arch:x86

    29b61e5a552b3a9bc00953de1c93be41


    Headers

    Imports

    Sections

  • Built.exe
    .exe windows:6 windows x64 arch:x64

    72c4e339b7af8ab1ed2eb3821c98713a


    Code Sign

    Headers

    Imports

    Sections

  • l �4��.pyc
  • Client-built.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections