Behavioral task
behavioral1
Sample
cfa3e70edad9d0ae968db1c81185f24e03258fe92f56e96d30d27d0393a9a100.exe
Resource
win7-20230703-en
General
-
Target
c89b4f642249843914da870e9d6ad892.bin
-
Size
229KB
-
MD5
8b61e99403d7d55d21385ed1c275e08d
-
SHA1
9c526d54b06708ca30588215d92b6a48a3ed5274
-
SHA256
187bbce6270b454b94ca69fa1f127dba9ef0065eb755397122e4e1f4a8af3b14
-
SHA512
0f99a045b563ba7aa67862a6f2989dcee30ee1d380d1e271fbebb8d4cd08ea6996151354db206898d5a11ab6790a783bcde52e15766229293034bada1340582e
-
SSDEEP
6144:E2x3PZLKfCo1hqjnoWXNSUV0vcmov45zj:E2dLjnt4Q0vcd453
Malware Config
Extracted
quasar
1.4.0
DELL10
ntdetect.ddns.net:4782
65b22357-af35-4137-81c8-1ce3a3a03197
-
encryption_key
8D7182C4F946F4F7A0DF42F95486E70CC9DC320E
-
install_name
NTDETECT.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
NTDETECT
-
subdirectory
NTDETECT
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule static1/unpack001/cfa3e70edad9d0ae968db1c81185f24e03258fe92f56e96d30d27d0393a9a100.exe family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/cfa3e70edad9d0ae968db1c81185f24e03258fe92f56e96d30d27d0393a9a100.exe
Files
-
c89b4f642249843914da870e9d6ad892.bin.zip
Password: infected
-
cfa3e70edad9d0ae968db1c81185f24e03258fe92f56e96d30d27d0393a9a100.exe.exe windows x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 498KB - Virtual size: 497KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ