General

  • Target

    9a593704c5bff7cefe97563fa349a0eeb2cfacc4fa0c3f99a16064b855084c9f_NeikiAnalytics.exe

  • Size

    3.1MB

  • Sample

    240628-qv63rasckh

  • MD5

    d181dce39738d9e0dc2bb72f6eed42c0

  • SHA1

    1a29deb5438dcd846481caa1ff63e20fbab3a105

  • SHA256

    9a593704c5bff7cefe97563fa349a0eeb2cfacc4fa0c3f99a16064b855084c9f

  • SHA512

    3560422321ad7790f24194bd70a6eec3f51a167aa579706364ff904bea3c848baafc58789833130a81b3c3fcaf3d286423dc75a74ac2dccb657407f644a44cfe

  • SSDEEP

    49152:fvilL26AaNeWgPhlmVqvMQ7XSKH9RJ6CbR3LoGdsTHHB72eh2NT:fvaL26AaNeWgPhlmVqkQ7XSKH9RJ68

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

badgeroblxo.ddns.net:1234

192.168.0.107:1234

Mutex

48a9e5c0-f0c1-4182-bc93-e4c42d5e6d72

Attributes
  • encryption_key

    524892BD8A433CE8E6A342E36737F573CEF5D252

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      9a593704c5bff7cefe97563fa349a0eeb2cfacc4fa0c3f99a16064b855084c9f_NeikiAnalytics.exe

    • Size

      3.1MB

    • MD5

      d181dce39738d9e0dc2bb72f6eed42c0

    • SHA1

      1a29deb5438dcd846481caa1ff63e20fbab3a105

    • SHA256

      9a593704c5bff7cefe97563fa349a0eeb2cfacc4fa0c3f99a16064b855084c9f

    • SHA512

      3560422321ad7790f24194bd70a6eec3f51a167aa579706364ff904bea3c848baafc58789833130a81b3c3fcaf3d286423dc75a74ac2dccb657407f644a44cfe

    • SSDEEP

      49152:fvilL26AaNeWgPhlmVqvMQ7XSKH9RJ6CbR3LoGdsTHHB72eh2NT:fvaL26AaNeWgPhlmVqkQ7XSKH9RJ68

MITRE ATT&CK Matrix

Tasks