General

  • Target

    a4cbe08b12caf091cec50234d9a2d54ffbbd308b4e3c76ef5394c21a35d0e043.exe

  • Size

    3.1MB

  • MD5

    b29de0d04753ec41025d33b6c305b91d

  • SHA1

    1fbb9cfbda8c550a142a80cef83706923af87cd8

  • SHA256

    a4cbe08b12caf091cec50234d9a2d54ffbbd308b4e3c76ef5394c21a35d0e043

  • SHA512

    cfa6f06cb7e2a8e1ff888fc783e0271f61db39251350423432d4be829188c98cd744e946595ccc01c9ad2b03053a10efa13312ce70c80f837293b6785c215816

  • SSDEEP

    49152:zvHI22SsaNYfdPBldt698dBcjHOd/mBx3LoGdbTHHB72eh2NT:zvo22SsaNYfdPBldt6+dBcjHQ/e

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Windows Client

C2

148.163.102.170:4782

Mutex

4c18e02c-7c39-4a5e-bbef-16fe13828101

Attributes
  • encryption_key

    73B0A3AC50C78E243EA93BF9E60C9BC63D63CA26

  • install_name

    Sever Startup.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Startup

  • subdirectory

    Windows Startup

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a4cbe08b12caf091cec50234d9a2d54ffbbd308b4e3c76ef5394c21a35d0e043.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections