General

  • Target

    42f1ecb6f9e2f73bb66e84e5f8ca4fb4.bin

  • Size

    122KB

  • MD5

    ef1f247a8ada6b819671c41903375d55

  • SHA1

    ebe0c341a8b013537f2988623639b7f489a8c4ef

  • SHA256

    4aa1ef6600a523f37a28a4d472080741093f629b037ba189bc79a1b6f8ab6a4c

  • SHA512

    310a10a06e70c63ec463110d3723952e090abce5130cc3e30ab20ba0f90d28515075c061e8d6a1c4b15b9df96e6d4323133a531882ed03fbffce3c9f954895be

  • SSDEEP

    3072:V4+zsLRFJAy1Za+N3xwVqnK8FLDn8+bESD6RYUtBZTB/jHEM3:JY1puN8VZbZD65vThb3

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.0.0

Botnet

Office

C2

45.136.51.217:5173

Mutex

fJtDNXkZg2XmnSxFi9

Attributes
  • encryption_key

    7Ds8HmxRNTT7TqM6R6Sm

  • install_name

    csrss.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    NET framework

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 42f1ecb6f9e2f73bb66e84e5f8ca4fb4.bin
    .zip

    Password: infected

  • 2a700406a42a06541dfee93faa1079b51c7a899e3cffcbc31390473852d7e5cc.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections