Behavioral task
behavioral1
Sample
06f7a5380d0d2f23e9c481071e7766486806d38c6cd5785b5897863b481d56d1.exe
Resource
win7-20230220-en
General
-
Target
06f7a5380d0d2f23e9c481071e7766486806d38c6cd5785b5897863b481d56d1.zip
-
Size
1.2MB
-
MD5
82bf6857cc054e2899e65a987a1eb2b7
-
SHA1
a7cb47454213655c6d30cd0dc38b72e3f056d08b
-
SHA256
b1ffe365891866a746467e285bec304dfe9924403863aafcceaba25633e86afc
-
SHA512
42ff0f4f5c85fad3b19601c58d031763fce51cdae3e67cc632f020b329d11766a618d1ed8c6613e7ea60393064d4f57c80637dcc40d3a0f7eed9175499aaf602
-
SSDEEP
24576:D5CyprY6SncREg6y5qytWmrp61Q0Y5bMt+b8J2DkvWmTNrrXSzhkOO:jYgRbtbF61vY5QOVDK7TVrithO
Malware Config
Extracted
quasar
1.4.1
Office04
ihateniggers5544.ddns.net:8809
b70e724b-4202-4eaf-b98a-4e60321e81b1
-
encryption_key
17A6263AC244917D1D2FCDF862A8A170BBA832F9
-
install_name
Spoofer39.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Explorer Management
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule static1/unpack001/06f7a5380d0d2f23e9c481071e7766486806d38c6cd5785b5897863b481d56d1.exe family_quasar
Files
-
06f7a5380d0d2f23e9c481071e7766486806d38c6cd5785b5897863b481d56d1.zip.zip
Password: infected
-
06f7a5380d0d2f23e9c481071e7766486806d38c6cd5785b5897863b481d56d1.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ