Behavioral task
behavioral1
Sample
UD.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
UD.exe
Resource
win10v2004-20230220-en
General
-
Target
UD.exe
-
Size
3.1MB
-
MD5
8eeb2a1b1c1f5abb96801789585eb940
-
SHA1
4ad1d0f1a048ba9615dccd16fae6526180365499
-
SHA256
b6d5b869720645aefed2e060c1828fa54bfb4faedbe9bebc5d41928110b2ab2d
-
SHA512
62f216a6920f393ab9a68a8dc83b8559fe4ef3a770a092ec4f046a189bf57a10cb2a43a8c1299b828ad5cde62f2415e510af47f94b49fa9e0f510b0b0b4bf4a2
-
SSDEEP
49152:yvFt62XlaSFNWPjljiFa2RoUYIXQRJ6mbR3LoGdPNTHHB72eh2NT:yv362XlaSFNWPjljiFXRoUYIXQRJ6g
Malware Config
Extracted
quasar
1.4.1
ReServices
bobbawb1000.duckdns.org:59955
a97b7b05-f9a6-4a97-9f99-a2119823cf8f
-
encryption_key
B451C26057A2AEFC83990793720D2316EA48C49A
-
install_name
renservice.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
renservice
-
subdirectory
servicerenk
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource UD.exe
Files
-
UD.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ