Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20221111-en
General
-
Target
tmp
-
Size
348KB
-
MD5
6bd31d02674a8de7f52ce57811f98675
-
SHA1
31c803e0f2772588e4d0e37b952f06b990284e6c
-
SHA256
0fd5478ebee0f93e857f417d335005e70c2fb1ea391530c9405bf1f68dd4e5ba
-
SHA512
0b9143d7a725f7d745749007d7fae10c8b0ed1f7b1211bda9e192e79f1d3a87ce59ef1ae7b255ec30b2d67d0761e16818d6cb4e9c458e4eb4095f56d03e9b553
-
SSDEEP
6144:Ui6bPXhLApfpcwBuGeH2bU8QeDL/YDh/I+:nmhApJBuH98bfgDhg+
Malware Config
Extracted
quasar
1.3.0.0
taskhostd
205.185.126.148:666
QSR_MUTEX_eKOC3FxUJYmTXUa6V7
-
encryption_key
BXzANUQAMdBgSDlVbjI0
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
300
-
startup_key
svhosts
-
subdirectory
subdir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar
Files
-
tmp.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 344KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ