Behavioral task
behavioral1
Sample
4e9e02f9b59d580cee08f8f3e7804f7a8f8b12c93e027ba6fd211ac4815e98fa.exe
Resource
win7-20220414-en
General
-
Target
4e9e02f9b59d580cee08f8f3e7804f7a8f8b12c93e027ba6fd211ac4815e98fa
-
Size
348KB
-
MD5
6e5fef5da8810aa3fffad5a486c68cf3
-
SHA1
70f6507e9b2644fbcb75c78c6660dbdca4da5ef0
-
SHA256
4e9e02f9b59d580cee08f8f3e7804f7a8f8b12c93e027ba6fd211ac4815e98fa
-
SHA512
94dec0822aef151ec843732e9f13d550c59bb4575f8fff7822f5c2bf4d36854dc0c4061dbbcd6c2377aaac77ad86aa48092515fdc7388148e76db96f8417d027
-
SSDEEP
6144:MI6bPXhLApfpW3x/SJh06ixR9bW0jCagTL0+Xp+ezEAHUS:dmhAprJhVizQ0GP0+UezEPS
Malware Config
Extracted
quasar
1.1.0.0
System
82.202.167.203:4444
xTSR_MUTEX_JOBXsgj4pMGMmIDVNc
-
encryption_key
eu7tm2CUeFG5FGwJlQkW
-
install_name
core.exe
-
log_directory
logs
-
reconnect_delay
3000
-
startup_key
System Core
-
subdirectory
system
Signatures
-
Quasar Payload 1 IoCs
Processes:
resource yara_rule sample family_quasar -
Quasar family
Files
-
4e9e02f9b59d580cee08f8f3e7804f7a8f8b12c93e027ba6fd211ac4815e98fa.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 344KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ