General

  • Target

    1520-12-0x0000000000400000-0x0000000000724000-memory.dmp

  • Size

    3.1MB

  • MD5

    472f2414bf9be3f21f7a97e04b836b95

  • SHA1

    44f9e1e3768470502560e609901c74ddeae4125b

  • SHA256

    6cc5646d8825c9da3723e6b5220287788fca8f6979728b73646ac8795a765a05

  • SHA512

    115fbbca268445c6d3406acb9f5ea1b44cf8e8e58796de514eb29a622fee12ae127b6c86af10daee619e1d9318638a31265fac68cef60417c6d96f280f63c811

  • SSDEEP

    49152:KvrI22SsaNYfdPBldt698dBcjHlWRJ6YbR3LoGdBTHHB72eh2NT:KvU22SsaNYfdPBldt6+dBcjHlWRJ6y

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

DAVE

C2

hoffmann3.ydns.eu:5829

bich23.ydns.eu:5829

Mutex

309db0e8-63c5-4e08-a2f3-92745d11177da5

Attributes
  • encryption_key

    C5B555A83D127A9553D4FB1FCECB35CE8E91A447

  • install_name

    outlook.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Outlook

  • subdirectory

    WindowsUpdate

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1520-12-0x0000000000400000-0x0000000000724000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections