General

  • Target

    Client.exe

  • Size

    3.3MB

  • MD5

    a7d8d5d51a30e277af5ea3df03e07c23

  • SHA1

    c69bff47d7e04ee6e4fd39f8f045aa340fb8d3dd

  • SHA256

    f4f3e5df2e81346f7c914d43172ea881e890f3e6237e3d87ff93af1a4a99d712

  • SHA512

    ed4378acce2a8a184b14bfdd560e368c39821c0955115f5603a0c80824eb51bb57d47e91a9a74fa8f1a9951d47b8e5b9a652c667d67582e211e397fadaae5d7e

  • SSDEEP

    49152:nTF8mFA28qaZwpMPfl6/NK7xVcXbXxUEuMj36qnb4qiZ3lCKaGv2LkmNK:nT2mC28qaZwpMPfl6lK7xO7b

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Traige

C2

Alessandrolol66-30592.portmap.host:30592

Mutex

45bdc82f-bdfb-446e-af9c-d0a46e53752d

Attributes
  • encryption_key

    B11D992865826F9FDFE1488DBCF3B1031C9ED9CB

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows.Sys

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Client.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections