Behavioral task
behavioral1
Sample
1720-66-0x0000000000400000-0x000000000045E000-memory.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1720-66-0x0000000000400000-0x000000000045E000-memory.exe
Resource
win10v2004-20220812-en
General
-
Target
1720-66-0x0000000000400000-0x000000000045E000-memory.dmp
-
Size
376KB
-
MD5
fb0731dd581770e6f31d88b5a03242c3
-
SHA1
c2cb4815dbf4faf3dd8e4bc089758f4be7a13edd
-
SHA256
d52f05d6eaf83dc86a92eeb8e0d349d6fbadee51bf7baea787e492ab49affa40
-
SHA512
235dd8568f74655c58841a66327b38e1b375a3b52da8722a951e7459353cc2b007a496715e7ab4b7a3efd81a2fd595a8171f0536a386eef183474637f90071ce
-
SSDEEP
6144:4I6bPXhLApfpdtM7speRO/MDa0v6prsHUbXy3BbJjUeykFvM5lK:BmhApO7dWOEODFvM5lK
Malware Config
Extracted
quasar
1.3.0.0
hwl
camgreetgroop.sytes.net:64578
QSR_MUTEX_uXyr2s0hu5oh27MrQH
-
encryption_key
Ct5dpgJ3AraRRurwTjm8
-
install_name
cit.exe
-
log_directory
Logs
-
reconnect_delay
9000
-
startup_key
bte
-
subdirectory
rvi
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar
Files
-
1720-66-0x0000000000400000-0x000000000045E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 344KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ