Behavioral task
behavioral1
Sample
1476-111-0x0000000000400000-0x0000000000484000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1476-111-0x0000000000400000-0x0000000000484000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1476-111-0x0000000000400000-0x0000000000484000-memory.dmp
-
Size
528KB
-
MD5
19ef166895e726d459e8ff753f0826f8
-
SHA1
78377cb09d468aa6fa61e33cf241dedd9c1003d2
-
SHA256
f46b2fd4bce36c48196a168aa29f9fba33df470addbcb4a7959d33a388fb847c
-
SHA512
fa2135dd6191f720f8225a706d8e71f8e870f59233cb06ad498203f8c729f7e33c8a82ecbd4adc606c34caf77a5298b4e064531a7a6561f523cd89bc128f3cad
-
SSDEEP
6144:ETEgdc0YtebGbXOsA6j1RdhM1scdpQ2JXVPv1XcEn9b8F9XjO+EDbni9BycTR3:ETEgdfYFA6LctT3CBO+8bi2cd
Malware Config
Extracted
quasar
1.4.0
Pure____1
sabifati.linkpc.net:4784
deli.mywire.org:4784
3a359e52-00bd-4e3d-8201-985b53b0c176
-
encryption_key
78BC50021362B61652204981B13FE17E053A03F1
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar
Files
-
1476-111-0x0000000000400000-0x0000000000484000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 498KB - Virtual size: 497KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ