Behavioral task
behavioral1
Sample
Device/HarddiskVolume4/Windows/SysWOW64/Svchost/svchost.exe
Resource
win7-20230220-en
General
-
Target
MDFILE02_2023-03-13_04_58_51.zip
-
Size
181KB
-
MD5
ce136219c5839f3f997fd692260f45e2
-
SHA1
d8ad1d7db08d478dc1b6cfa1d9d55b44c85c5392
-
SHA256
645c67f8e3ecb1b75355291849195dfe38630a197064ff9c944b17eec561ef84
-
SHA512
4c4b6364da61cd7a115a1d3fdd85f76512f8d47454a731e377acc0253f31bbdd1a515be844be2638fe29a1cf29895c21e0bb26ba8d4ff47b69c404be5f94f758
-
SSDEEP
3072:EwrfXw/JXODb+FoK1D4Dx4LpFgxWpRi3Nwdae7QO5XVSR2u3Dpf5SG0SW/cLT:Ewrf2tFoKFIxSRi3NQt7DVV61vk/e
Malware Config
Extracted
quasar
1.3.0.0
Qwazar
45.8.145.254:5984
QSR_MUTEX_6RUI3790thKvUgdQ05
-
encryption_key
H7fYvd6ooQ98IA8qAG3x
-
install_name
svchost.exe
-
log_directory
logz
-
reconnect_delay
3000
-
startup_key
Svchost
-
subdirectory
Svchost
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule static1/unpack001/Device/HarddiskVolume4/Windows/SysWOW64/Svchost/svchost.exe family_quasar
Files
-
MDFILE02_2023-03-13_04_58_51.zip.zip
Password: Malware123!!
-
Device/HarddiskVolume4/Windows/SysWOW64/Svchost/svchost.exe.exe windows x86
Password: Malware123!!
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 346KB - Virtual size: 345KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
manifest.json