Behavioral task
behavioral1
Sample
3612-79-0x000001E86B900000-0x000001E86C166000-memory.exe
Resource
win7-20230831-en
General
-
Target
3612-79-0x000001E86B900000-0x000001E86C166000-memory.dmp
-
Size
8.4MB
-
MD5
a1e49d45ddab33f6cf6758688bfd09c2
-
SHA1
ba0717e661f36acf24c06591c6cf5075f202ec26
-
SHA256
3a63c027238130afc50be6b429c8224418e48ccd73b486a44e3231a528c87039
-
SHA512
5b5bc6b8c0c8524515c3ece112cbcd8d6079cdf944b4c824cff2a6d7aa8d5f35b07ebf523ad88140f6a2ce76ea7f20e1d3c2d1ef6437bf5bea3ca64d669339d9
-
SSDEEP
98304:l6G0UT5A3L1m6qClTlT9RXhtIU+ara74wWmVmUYMvvwkpOwhx/cxmnxK3fABocki:l6GD6vdLXhtI427GyYSZpxhxExEo3f5
Malware Config
Extracted
quasar
1.0.0.0
v2.1.3 | SeroXen
supply-dressing.gl.at.ply.gg:43425
buy-positioning.at.ply.gg:58563
faab7ba6-5935-498d-9629-58f1913a65cb
-
encryption_key
045F98A287DD47B8B5C074D234995A2C5A913042
-
install_name
.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
1000
Signatures
Files
-
3612-79-0x000001E86B900000-0x000001E86C166000-memory.dmp.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 8.4MB - Virtual size: 8.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ