General

  • Target

    1.exe

  • Size

    9.9MB

  • MD5

    96d23c2d4dcee40729b28f949ca2d003

  • SHA1

    8ab47f812f842cf093c0289daab045fb534ea7a1

  • SHA256

    13d446a0227f75aa7cf81637029ecc0dd2238639a4c1cdef89748b360be7c626

  • SHA512

    0b3b780f7ec58137bad0c97d8974ed6c4e8ecb5d1e2dab2e2c424cf172f24bb87dbd7f1d36249fae346bcb3e98d2877863b66ac41b0b09afe1d2e97907d6d34d

  • SSDEEP

    196608:3iHTKMoeQFbfeN/FJMIDJf0gsAGK5SEQRWuAKt+L:M//Fqyf0gsfNRAK

Score
10/10

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    3000

Signatures

  • A stealer written in Python and packaged with Pyinstaller 1 IoCs
  • Blankgrabber family
  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • �8����.pyc