General

  • Target

    Velocity.exe

  • Size

    3.2MB

  • MD5

    537055d2d528bfbe39b4ed23f981bc3f

  • SHA1

    d1779f003cc53b6b62aad0aa569d159fcfff481e

  • SHA256

    e864d7a6f0e27540456778b7f8dd2d0b290cd2566c57912aa6aa224e6af8e90f

  • SHA512

    eace66995f8d17d8f3e83f27a9dd0cfda1774c680cb5b1e912d6fbc96b395aa58d048cc06ac1aae3742bf782e863c0255a77e7e8d980b544e85a7031af87f4dd

  • SSDEEP

    49152:pvnI22SsaNYfdPBldt698dBcjH7jZUHBeMuoidXTHHB72eh2NTw:pvI22SsaNYfdPBldt6+dBcjH7VUwv

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office4

C2

192.168.70.183:4782

Mutex

1b6fc605-bba5-4ddc-971f-36e190d34bce

Attributes
  • encryption_key

    B87D07BD2442C5166BC5075BBDF32026912B9388

  • install_name

    Velocity.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    RobloxPlayerBeta

  • subdirectory

    .minecraft

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • Velocity.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections