General

  • Target

    BypasserRunFirst.exe

  • Size

    3.1MB

  • MD5

    2c39f6ceea730bcfd551fb106fddf974

  • SHA1

    5fbb018bd30429085f0309503901e04625a8847b

  • SHA256

    7dcda14173a0d102d6a02d290cbba10bd8a70e689375700bf0f322ea500c11c2

  • SHA512

    5a24f72f34170f3396524d062c4ae63c4f8ca6766783aeb730c063a8e8dff36a95f2054d45a3c9e0b5292818f70dc9bd7e2c65bb2f573537241d4f8c438fbbad

  • SSDEEP

    49152:SvLlL26AaNeWgPhlmVqvMQ7XSKuiSg1J/VoGd0hTHHB72eh2NT:SvxL26AaNeWgPhlmVqkQ7XSKuiSO

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.3.210:4782

Mutex

66e2d8be-f2d1-430b-a858-bea567f34e0d

Attributes
  • encryption_key

    6DDF2A1446CC876583B8AB188D7732CB160FAE85

  • install_name

    TemperSpoferByCapyLovers.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • BypasserRunFirst.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections