General

  • Target

    RuntimeBroker.exe

  • Size

    3.1MB

  • MD5

    a2f4860ad05a29d90e63f7a2f42dd1d9

  • SHA1

    c4f6c99b7e6f895114c6e5303391f3839bc4ed7c

  • SHA256

    545155733d81e6f53f8aaf0aa36ea26dcaf8d07ede5059a22b095050fd766c4c

  • SHA512

    d9e82e2470cc95ebfb4eee7c466d16e52e1de2e8819b4a18b9edff476744b5cbf2233b966b22ff80cdbcf2557d704840e9aade9d83cfffa6680f54824dce3c37

  • SSDEEP

    49152:rviG42pda6D+/PjlLOlg6yQipVA4mLmz9LoGdSTHHB72eh2NT:rvF42pda6D+/PjlLOlZyQipVA4my

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

revershe

C2

holefo2785-22820.portmap.host:22820

Mutex

3292df4f-7857-466e-995d-33740d2e756e

Attributes
  • encryption_key

    14B98F14C8A2574E32B0396E72660E0C80B14AC2

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    RuntimeBroker

  • subdirectory

    discord\Network

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • RuntimeBroker.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections