Resubmissions

30-10-2024 00:08

241030-ae58hsself 10

General

  • Target

    Spoofers.7z

  • Size

    8.2MB

  • MD5

    cb7960f8fb08dc1d63269e205e490b03

  • SHA1

    184d929681a0d5ae239f148214ee5d070b1adc69

  • SHA256

    4fa37e700c2b9ee257995cc82ad1f02b02bf5b031a5fda15ff34277c82239d8a

  • SHA512

    852ea8344772464f4bdbca2108a33bc156b2c7d99ff40588a07e98c055a996567496196f5f1fe7512a1d8cb7a8e132942f7c1a157ad45fe6314838c13ed5eb12

  • SSDEEP

    196608:yW6AJ7/yLztIl+W2KPmH84G0pD4VdsR5CloWINqDlIn9FRDRf:SA1/yLKH29c4/V2e5QoWINAIn93DN

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.1.28:4782

Mutex

03ef2b9a-5389-4312-b3d3-9b6f68cc5386

Attributes
  • encryption_key

    F8A900CD75D848E74023B3A66FA8AA5469C97692

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    ahhaa

  • subdirectory

    SubDir

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Spoofers.7z
    .7z

    Password: Ratter24

  • Spoofers/Cleaner.exe
    .exe windows:6 windows x64 arch:x64

    Password: Ratter24

    72c4e339b7af8ab1ed2eb3821c98713a


    Code Sign

    Headers

    Imports

    Sections

  • �g�K��.pyc
  • Spoofers/PermWoofer.exe
    .exe windows:4 windows x86 arch:x86

    Password: Ratter24

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • Spoofers/READ ME.txt