General

  • Target

    73725a049fd9de8bb148782333cb8bdcae43eb51347f4bf92dd28e74cd6b7229

  • Size

    916KB

  • MD5

    de2048e10e252a01bf6ca4e5a30f932c

  • SHA1

    d0b49ad6cfd71d97688edeb57ccb37cd4e7e8480

  • SHA256

    73725a049fd9de8bb148782333cb8bdcae43eb51347f4bf92dd28e74cd6b7229

  • SHA512

    5ebd3bccea862032a00b5644bcf83d62afeb3e999005f212fc677c38dd22d8d4d9c73dd14e88cd9a4c628723a4dc9a933d8e6165a08bee9e70401a8e5651751c

  • SSDEEP

    24576:tmkdueXjq0OQKc2YSEegpQRDLusJLK1lkdoLP:IkdueXjq0OQKc2YSEegpshk1lk

Score
10/10

Malware Config

Extracted

Family

quasar

Version

2.8.0.1

Botnet

j4s0n

C2

68.178.203.123:5552

Mutex

5bTQr1u1WE7Wm1AFuq

Attributes
  • encryption_key

    SjZVHKez6ec8FMkfWYi7

  • install_name

    Venom.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 73725a049fd9de8bb148782333cb8bdcae43eb51347f4bf92dd28e74cd6b7229
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections