Behavioral task
behavioral1
Sample
3d57b604db0023cc57de8f224ad5b211a0a5250de68671fc61c55e1b354ceb38.exe
Resource
win7-20220812-en
General
-
Target
3d57b604db0023cc57de8f224ad5b211a0a5250de68671fc61c55e1b354ceb38
-
Size
534KB
-
MD5
56e0b329f07f5e571a59183e837c6113
-
SHA1
d72f777ded579dcc64ce7c71dab78c04211cd7bd
-
SHA256
3d57b604db0023cc57de8f224ad5b211a0a5250de68671fc61c55e1b354ceb38
-
SHA512
86bc95c1778646fba94902b13334e33566787cd80700b2de81901780742ac985efc6bbc81ccf6441b61ade34b5fabffec57704f43951c7abee7883c6650aacb5
-
SSDEEP
6144:q0CSRbKT1aQtImwdlVLghczqJhrow83lYN3/CL3ntlb43Y7cRDlWFbXoY8j0:q0hRatI4cm4wela3qDntaYgRDQhJo0
Malware Config
Extracted
quasar
1.3.0.0
OG
poer.whoamis.info:8080
QSR_MUTEX_kTtNJhYiOMnk8P9W2f
-
encryption_key
ZXzphmvZbuoIuRJjZbAhgXCPd6sp5Ixd
-
install_name
dllhost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
dllhost
-
subdirectory
dllhost
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar
Files
-
3d57b604db0023cc57de8f224ad5b211a0a5250de68671fc61c55e1b354ceb38.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 531KB - Virtual size: 530KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ