General

  • Target

    a722d5c6160420869e7db22ee1bd07f83aa9078f6099370a8b07456e22da4b98N.exe

  • Size

    3.1MB

  • MD5

    ed8587b8361fe7ababea56910e3a7750

  • SHA1

    9c4cf2e76a09b8bed78ae240e6c35deaa4b3f5d7

  • SHA256

    a722d5c6160420869e7db22ee1bd07f83aa9078f6099370a8b07456e22da4b98

  • SHA512

    18248abf111d37412df931eece3b28d9314358fb21282c791d7dc45f97fa1a8de7ac5728c8f2687a0a4d648f6fcffcecf54c4e7d6f6c61a3bee017b01f52b6b3

  • SSDEEP

    49152:mvDI22SsaNYfdPBldt698dBcjHM/RJ6bbR3LoGdOTHHB72eh2NT:mv822SsaNYfdPBldt6+dBcjHM/RJ6t

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

SvchostMan

C2

121.89.184.234:4782

106.241.55.218:4782

Mutex

3094dfa3-6b09-4170-abb5-cd6f0b055018

Attributes
  • encryption_key

    A5C933A97D91C5A7CDBF6D4FF8D161BFBC686474

  • install_name

    svchost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Svc Name

  • subdirectory

    drivers

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • a722d5c6160420869e7db22ee1bd07f83aa9078f6099370a8b07456e22da4b98N.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections