Behavioral task
behavioral1
Sample
1296-69-0x0000000000400000-0x000000000045E000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1296-69-0x0000000000400000-0x000000000045E000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1296-69-0x0000000000400000-0x000000000045E000-memory.dmp
-
Size
376KB
-
MD5
0ae162e47ece9afc55cdffbd41b38bd7
-
SHA1
baf3461f966d9b27de9e1f2c430aa1e61153ea66
-
SHA256
983de2ae3027bbbcd76ab0e78697ce63536e03d572a0f31fea093ce336baa023
-
SHA512
7742ab9fb4e8e613d1030ca8a1a30a92fd3fedeb4cbc57a06ca56aa019455015bbdbf5d16eeab615d785b8446319e457c11ebdcca8099f059c66a859d43cd484
-
SSDEEP
6144:ot6bPXhLApfpNlJ53QLy6bVyefqyDi4MHRNhg:cmhApFJ2ylyu4MHRNhg
Malware Config
Extracted
quasar
1.3.0.0
SUCCESS
41.185.97.216:4782
MUTEX_KMkEYpkuWKDvhVsEcT
-
encryption_key
kbnBYlo1Zoug7VQGhNv1
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
cmd
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1296-69-0x0000000000400000-0x000000000045E000-memory.dmp
Files
-
1296-69-0x0000000000400000-0x000000000045E000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 344KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ