Behavioral task
behavioral1
Sample
asdasdsada.exe
Resource
win7-20230712-en
General
-
Target
asdasdsada.exe
-
Size
3.1MB
-
MD5
05a5ad59a263d577fbf7824da19f52c0
-
SHA1
f1e59d269eba32b689b955666ac2b7cb7f28eb71
-
SHA256
dc2e73a62f8b7544a3c9597784c56e59f9e6f3ec15842b2be8b45ede3634cf94
-
SHA512
28f630d95b47940f1a9259191931ee6c2548fdbe34af5064626f55f1c798b5c0cd91a5d46440298b95e57b7b532696b48b8bb5605fd3e80db6073a217424be49
-
SSDEEP
49152:fvWlL26AaNeWgPhlmVqvMQ7XSKzvRJ6wbR3LoGd0THHB72eh2NT:fvWL26AaNeWgPhlmVqkQ7XSKzvRJ6K
Malware Config
Extracted
quasar
1.4.1
Infected
192.168.1.1:4782
192.168.1.66:4782
ff410ede-beff-4970-8e12-7d251057f1fd
-
encryption_key
1B172706DED462B59F2A5056AB06A8DD1EE8491B
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource asdasdsada.exe
Files
-
asdasdsada.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ