Behavioral task
behavioral1
Sample
1924-57-0x00000000000C0000-0x000000000011E000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1924-57-0x00000000000C0000-0x000000000011E000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
1924-57-0x00000000000C0000-0x000000000011E000-memory.dmp
-
Size
376KB
-
MD5
20d8d06fdd4a709d61d941f236b9affb
-
SHA1
c1fcd90d0b829806dc8ad4d6e2f344ee6ec4a9a1
-
SHA256
3af96f2ed787f02d169e7a9777c2663706855b317e9e4a0f4ead28371c7c8895
-
SHA512
18d34f3e01a87a3273265d92ce055970c95133ed7ee47457a1204efe23fc8d71612db15fd85ea642a0d84cc4eec043b221d14d4fb1bd77881a37f854d1284333
-
SSDEEP
6144:k0NzU3eAKdB40HStLwQfMUbJpz3wJxK5CR:5Nue9B408EQfdRwJxK50
Malware Config
Extracted
quasar
1.3.0.0
EdrawMax
forex.4cloud.click:1981
wsbTZmpkXyxm8xAsQP
-
encryption_key
iBgx6lbqLn18oNE3C8cN
-
install_name
Client.exe
-
log_directory
16k
-
reconnect_delay
10000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1924-57-0x00000000000C0000-0x000000000011E000-memory.dmp
Files
-
1924-57-0x00000000000C0000-0x000000000011E000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 347KB - Virtual size: 347KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ