General
-
Target
client_1.exe
-
Size
3.1MB
-
MD5
6b77a49768be535c52b7851d94267986
-
SHA1
da5b95e09f1307f8c86794f241667082d35a30ec
-
SHA256
37e2000d6014f4aadd3ce9e666fe56950cc3a3664f8cafc60db7764e087f8916
-
SHA512
f3d6abe0352047da8c531f8a0ba56ec4ebb96a55c8b92374f720324dc040e7754f0db756dd58f7e516358babb6b91e9ac79c97286e49ce8026b636cac89c8a54
-
SSDEEP
49152:YvAt62XlaSFNWPjljiFa2RoUYIOQ0xNESEgk/izLoGd9THHB72eh2NT:Yvs62XlaSFNWPjljiFXRoUYIOLxb/
Malware Config
Extracted
quasar
1.4.1
Office04
bore.pub:22550
bb999b71-6352-4144-80ba-72dee1b1203d
-
encryption_key
741EA40283A4C5C802C55E59BD4F8B5785B0B44A
-
install_name
csrss.exe
-
log_directory
.logs
-
reconnect_delay
10
-
startup_key
Client Server Runtime Process
-
subdirectory
.network
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource client_1.exe
Files
-
client_1.exe.exe windows x86
Password: test123124124
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ