General

  • Target

    Blorious-V1.exe

  • Size

    3.3MB

  • MD5

    ab7ba1e3026b48ceadd7b68950f0e693

  • SHA1

    18f1b5fb26221b6404b549b09699adb7663d9b60

  • SHA256

    3fe52d194f176397ab988ef072b0cb64dd8a7997ce99e53fa36d94bc3d4beb45

  • SHA512

    d595be554b5cc1824a4310c1cd81c4357833f49c2f1fe48ab9133d1d6abfa34377b039d40a9acbcaedd28955f5b3b4c5e5a15faa55b10a4f7eb2420deb948b41

  • SSDEEP

    49152:rvyI22SsaNYfdPBldt698dBcjHjdSZ1J/foGdUNLTHHB72eh2NT:rvf22SsaNYfdPBldt6+dBcjHjdSp

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.0.134:4782

Mutex

b9145fb3-526d-41e5-a912-983ece635713

Attributes
  • encryption_key

    44DC4ECD533CD0CB4AAF178AEB927FA0D40432AF

  • install_name

    Blorious.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Microsoft Gaming Utility

  • subdirectory

    Blorious

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Blorious-V1.exe
    .exe windows:4 windows x86 arch:x86

    Password: infectmemorekid

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections