Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
20-09-2023 01:35
Behavioral task
behavioral1
Sample
83006c24730b2d7fb7506451aee3d6bb85cc27d64e230630bc66517c7ba9ed21.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
83006c24730b2d7fb7506451aee3d6bb85cc27d64e230630bc66517c7ba9ed21.exe
Resource
win10v2004-20230915-en
General
-
Target
83006c24730b2d7fb7506451aee3d6bb85cc27d64e230630bc66517c7ba9ed21.exe
-
Size
1.0MB
-
MD5
5a8434f899549874f8114dda6a6e2763
-
SHA1
5950904de381e2e16411b315ed91d683b11bd66e
-
SHA256
83006c24730b2d7fb7506451aee3d6bb85cc27d64e230630bc66517c7ba9ed21
-
SHA512
c6953fcaebd25e13c2d30362f60e3a2defc7c83e640b023f766dbbf305c30332d654d2882b8247126909f2bc994ec2268f0ee0e70a607d910a53b6ae8b98ed9b
-
SSDEEP
24576:Eaynkc1ZzBvtrZHFjMKY2GocjuN6Yelp+QlGVB/yqR:1ynkc1ZzBvtrZHFjMKY2kjuN6Yelpju
Malware Config
Extracted
quasar
2.7.0.0
Venom Client
crazydns.linkpc.net:3000
ER5Ojs5Por1j5joXR6
-
encryption_key
HHtj6qkHuyo7mzRB7Q0O
-
install_name
Venom.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/2424-0-0x0000000000D80000-0x0000000000E90000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2424 83006c24730b2d7fb7506451aee3d6bb85cc27d64e230630bc66517c7ba9ed21.exe