Behavioral task
behavioral1
Sample
1220-58-0x0000000000400000-0x0000000000510000-memory.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1220-58-0x0000000000400000-0x0000000000510000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1220-58-0x0000000000400000-0x0000000000510000-memory.dmp
-
Size
1.1MB
-
MD5
0475b6a97b0c8930a12a9eec1c3fde2d
-
SHA1
9d20064552e45a5ce9d33bad3529aa9dae9e8f68
-
SHA256
624c2905e8324f57e5a33d513d73739e9d85b02a8663db716baecf90a5649b9f
-
SHA512
928768eb8a70ec3cab9836f82f5742552e1203b2cb4f70efc064dc28213500633ddf7ee88bf05bf6642a978575980af7d1d7195f907105706fedd61bf6ba5971
-
SSDEEP
24576:Eaynkc1ZzBvtrZHFjMKY2C76R9elgFtcVg:1ynkc1ZzBvtrZHFjMKY2YI9elwE
Malware Config
Extracted
quasar
2.7.0.0
Venom Client
24.152.37.45:4782
JlYM51eW4iZoFyLa2X
-
encryption_key
zuQJeNRoNR3ra4fWyosx
-
install_name
Venom.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar
Files
-
1220-58-0x0000000000400000-0x0000000000510000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ