General
-
Target
SMSS.exe
-
Size
3.1MB
-
MD5
e13a0155794d4a05bc89613791380236
-
SHA1
d99af2c2846e0c8f4b557903df9b4c1a87585bf6
-
SHA256
5b76a4dbfc0d08d90ce4b0ad4ab6374d0590cb89d369d1cc885bd9be7efb5a6d
-
SHA512
54657d4d3959c33ec8ce6d3e983c05b27aae4081aec9f78c79d9ab16c86c9f052354784e9a8cc8c31482c37eeea402b28d4dfabce68e9ee5d57e534cbeb1929e
-
SSDEEP
49152:HvnI22SsaNYfdPBldt698dBcjH4WRJ6cbR3LoGd/THHB72eh2NT:HvI22SsaNYfdPBldt6+dBcjH4WRJ6m
Malware Config
Extracted
quasar
1.4.1
Pon
7.tcp.eu.ngrok.io:12225
5e9a9d41-187d-4dbc-b58d-2d437b9805a5
-
encryption_key
000B0FC52B6272482F163898894B0BB6D8795F55
-
install_name
smss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
RealSMSS
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SMSS.exe
Files
-
SMSS.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ