Static task
static1
Behavioral task
behavioral1
Sample
Trojan-Proxy.Win32.Qukart.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Trojan-Proxy.Win32.Qukart.exe
Resource
win10v2004-20240226-en
General
-
Target
Trojan-Proxy.Win32.Qukart.vij-e7dd64ac671958c9a19fd9b16822e628eefee63b37a37c27cc70f0afc3e42781
-
Size
320KB
-
MD5
2f1e4facf3ba3688dffbaf89877892bc
-
SHA1
ee9ea90b17009b0658345b2f12f2abe85a31358b
-
SHA256
e7dd64ac671958c9a19fd9b16822e628eefee63b37a37c27cc70f0afc3e42781
-
SHA512
e34c1e420c4aa5bfb92bfffa98d172879a904b8f369bea8e4c483c45f88fab6bca527f16b29f3c45d3bc95342ab4a56cae4e9d76b9a87d6e87c99a6e5da11155
-
SSDEEP
6144:6/NRXbHpvluY/m05XUEtMEX6vluZV4U/vlf0DrBqvl8ZV4U/vlfl+9Q:6/fdvrm05XEvG6IveDVqvQ6IvP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Trojan-Proxy.Win32.Qukart.vij-e7dd64ac671958c9a19fd9b16822e628eefee63b37a37c27cc70f0afc3e42781
Files
-
Trojan-Proxy.Win32.Qukart.vij-e7dd64ac671958c9a19fd9b16822e628eefee63b37a37c27cc70f0afc3e42781.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jfbbql Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ