General

  • Target

    21a6c7941638ef73d9b41185eea6f284f2df63d818a0aed86c391aa1d5aa26fb.exe

  • Size

    3.1MB

  • MD5

    a3ffca2a5a9a4917a64bcabccb4f9fad

  • SHA1

    9cfc0318809849ab6f2edfc18f6975da812a9f51

  • SHA256

    21a6c7941638ef73d9b41185eea6f284f2df63d818a0aed86c391aa1d5aa26fb

  • SHA512

    d491dcf7bf4d7d20632b31e82eee824ffb1eedca18f0f25b46aae1750f40240589e4600566e327bd866374ec36321db2d79f05fe6fc49ed3d30901e31bfc384e

  • SSDEEP

    49152:nv3I22SsaNYfdPBldt698dBcjHKPRJ6CbR3LoGd2THHB72eh2NT:nv422SsaNYfdPBldt6+dBcjHKPRJ68

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

dilly

C2

lvke-45989.portmap.host:45989

Mutex

0cb49dc2-fd0d-4581-ae1e-04154c41f310

Attributes
  • encryption_key

    E5250226804167CB0B1B4B0E9667D0C056694DCA

  • install_name

    defenderx64.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Defender Helper

  • subdirectory

    en

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 21a6c7941638ef73d9b41185eea6f284f2df63d818a0aed86c391aa1d5aa26fb.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections