Behavioral task
behavioral1
Sample
1752-65-0x0000000000400000-0x000000000045E000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1752-65-0x0000000000400000-0x000000000045E000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1752-65-0x0000000000400000-0x000000000045E000-memory.dmp
-
Size
376KB
-
MD5
7a089f786c15051bcb7eb8793cf84124
-
SHA1
964af6de2a6d1062ac9fd48c04ed4002824bc9d3
-
SHA256
440476332f073dd4c9b3eb1999480b553d699db16c46fdc022140bbe45add141
-
SHA512
41ed521d4940090d6081298c9c88a63ec7c055b19f466dd88c967495a0f9a878eea7069a410dff7127cd3118fa277c825b05cee989a5fe5cd950891554453f5a
-
SSDEEP
6144:ld6bPXhLApfpioGg8b1TEaU0Bb2ul9ec8tFOJtDLD+Dp:3mhAp9B8JEaJEjc/LqDp
Malware Config
Extracted
quasar
1.3.0.0
SUCCESS
41.185.97.216:4782
MUTEX_QAxMFzrXWG2cbIHPGK
-
encryption_key
4DwUV8AnxPgmXSMeThKb
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
cmd
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar
Files
-
1752-65-0x0000000000400000-0x000000000045E000-memory.dmp.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 344KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ