General
-
Target
Client.exe
-
Size
3.1MB
-
MD5
11d5d3ec42006ef6f0f868284ea9e147
-
SHA1
63babfce17067829398e78f31d214b404681e2b1
-
SHA256
76edb4609513aa41e49c2595b07874c3d75adddeaa987a3940370806a0f33f8b
-
SHA512
53b0702ae06eca6915a03d419aa8cb47c082305e9a1564475bc84376a02426b114261255d4ec2d5e9c43054b3b634c6d9859da8fd78c44ac66ac9ac5d3c2d2b1
-
SSDEEP
49152:rvCI22SsaNYfdPBldt698dBcjHSxRJ6cbR3LoGdmTHHB72eh2NT:rvP22SsaNYfdPBldt6+dBcjHSxRJ6m
Malware Config
Extracted
quasar
1.4.1
Office04
ratting-42498.portmap.host:42498
e6e9aab0-f5fb-4ccf-8885-f0ea03a94a15
-
encryption_key
3C32E8A197B894DA5850A6B90D12684B40B6F314
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Discord
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar
Files
-
Client.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ