Behavioral task
behavioral1
Sample
e3dc423684976ae02183ff7156153303f75d3961decb3215213faa46d0926c69.exe
Resource
win7-20230220-en
General
-
Target
21c687309d44259a119b6695bfa7dac8.bin
-
Size
1.2MB
-
MD5
7a6c8b4eaa9432e4549a453951a6812d
-
SHA1
0111cfd4ab493736d6ca902bafdde9078a5a2f70
-
SHA256
615abddf8898f1dc3c08de3a51ca736f70e23a65d93a005f55a9368a4d30c65b
-
SHA512
c6f6a8d28d582e3b93e21329748560a02fd8f2e5907e52a25ee56352426acc4bcbe8dddfb32cd1e3eb85a9338bcc0b9835f5592a8d64cbf0ea1379ec937f4f12
-
SSDEEP
24576:LhbchGa3bMcR7vXfP8Pai1SyoXfk6houc9gIWMMdV4yAR3UE:LhuVtp38ii83hIqIYV4yU3UE
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.174.129:4782
6f32bc27-b82b-47fa-bc73-4e37baf4a613
-
encryption_key
C7F72574BAC4D21027038342CF35587A52994C47
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule static1/unpack001/e3dc423684976ae02183ff7156153303f75d3961decb3215213faa46d0926c69.exe family_quasar
Files
-
21c687309d44259a119b6695bfa7dac8.bin.zip
Password: infected
-
e3dc423684976ae02183ff7156153303f75d3961decb3215213faa46d0926c69.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ