General

  • Target

    Wurst_Client_password_123.rar

  • Size

    1.0MB

  • MD5

    18478c347c569b4c7ef8c8db9665f1d5

  • SHA1

    fd54e1e9664d6fbdb132c62ffd4a2ef6e89897b5

  • SHA256

    66692d291cd990717ce709ee6af67f38124c57fdb6fe6e89f20cfffff3dd16d6

  • SHA512

    f98aab92eba2bc79813b30e619f9aacaaa8d5408111210fcdc94c7f8b215c90c29e511b2527e351bb2ef1ac54bb62f3a8569000427799332438a9b079d8dfafe

  • SSDEEP

    24576:yoYOuWb9jrkYC3HuaxpzsZHH0h5NnwaGdy02:4Wb9TauY9sZ0Fl/

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

myhost20292.ddns.net:4782

Mutex

829ab10d-b669-4914-94aa-0b29020c6f1f

Attributes
  • encryption_key

    975A6378A0F938D8B354B0AF273B7F68F0241913

  • install_name

    Wurst Client ModMenu.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Java Updater

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Wurst_Client_password_123.rar
    .rar

    Password: 123

  • Client/Wrust Client/Wrust Client ModMenu.exe
    .exe windows:4 windows x86 arch:x86

    Password: 123

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections