General

  • Target

    12d3a5848962353e0799964d9774bbbbf63c8d77a924f3cc14df49039c2ecb73

  • Size

    348KB

  • MD5

    222eb2520861357489b7a11a99656e3f

  • SHA1

    fb21802a64e6bbc3a9746e5ee5e4f92c2dc8bfcf

  • SHA256

    12d3a5848962353e0799964d9774bbbbf63c8d77a924f3cc14df49039c2ecb73

  • SHA512

    991d90dda45c324e4b15a3cf3d0f5209d2f71c4d3145169215737c448d8ce0da494f32a2187e5bddb4eac488a48e18b061ff7bd42d1a28458e472359af798ecb

  • SSDEEP

    6144:+V6bPXhLApfpUw4qCgafQbX30nlIHh/m7vHdjz7iO:umhAp6lqKfq0GheLHd/iO

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

ForceOP

C2

jordiek1d.ddns.net:4782

Mutex

QSR_MUTEX_Y1VQAwHslXRVvQkGHj

Attributes
  • encryption_key

    3xJFlGvSDHRDtYnPg0qe

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    WindowsDrivers

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 12d3a5848962353e0799964d9774bbbbf63c8d77a924f3cc14df49039c2ecb73
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections