Behavioral task
behavioral1
Sample
66d2983245305dc6fc932c8e6b4dee4cd5ff8835d88d848dff02c694a9950ca2.exe
Resource
win7-20230220-en
General
-
Target
15912b1f54762b107bb3eb0a3e719158.bin
-
Size
227KB
-
MD5
6997c9d40dbf3c0da23b8f87b2ba46a7
-
SHA1
0b9518064ddb87ab80a0b94f6d5191e70c4514ed
-
SHA256
9122247d468732fa60c2e4d818c938f26951c0ca394d068a1748b82e1c5bc543
-
SHA512
960b78e27c7ab8612a33aaffa210507bc5b4e681ed37962a4fbdf263bb643108a8ada52765f91be5d9854e3d0f5740b518bc8b415a5a1a6d71efb488188b4ba8
-
SSDEEP
6144:iN95GsVc8Z7ho2ZQWfMqQGoYyHVNF3VfTwIks5G+A2:K9EsjteWrQPYUVNFFkIks5I2
Malware Config
Extracted
quasar
1.4.0
Client 1
192.168.49.115:4782
34f868b8-bd8f-4422-9f8d-e3335481ce07
-
encryption_key
79B7FDEBDB6D20C0C842F4E8867893249517C6C3
-
install_name
Example.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
GGQUASAR
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule static1/unpack001/66d2983245305dc6fc932c8e6b4dee4cd5ff8835d88d848dff02c694a9950ca2.bin family_quasar
Files
-
15912b1f54762b107bb3eb0a3e719158.bin.zip
Password: infected
-
66d2983245305dc6fc932c8e6b4dee4cd5ff8835d88d848dff02c694a9950ca2.bin.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 498KB - Virtual size: 497KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ