Behavioral task
behavioral1
Sample
Client-deobf.exe
Resource
win7-20240220-en
General
-
Target
Client-deobf.exe.bin
-
Size
3.1MB
-
MD5
d7471180a1a335178c8062f57e2238f2
-
SHA1
f3e821ce5d1769feb271408746dbccb39e17a9ec
-
SHA256
520d3a1acd104bda412c4b6b118b2c4177fa5ae9c0294c18d8d81a5c604e946f
-
SHA512
420eef19289b550a2cdac7227e6c82ceff3e570bd2d37dadcd617804d16492913ecd7acef84d7962e1b081fe701bc3f609728e765a1829b8f597092c51dc6a84
-
SSDEEP
49152:H9taZ7HYaFI1ITamlivhumFgWdFxUhxGqTHHB72eh2NT:H9tapHYaFI1ITamliJumFg0x
Malware Config
Extracted
quasar
1.4.1
Slave
140.238.91.110:34353
25ab9d56-6ef2-47d3-99aa-2142fbcd41fa
-
encryption_key
8E710985199C6BF86CCE90DA92448A36E2F45F51
-
install_name
XWormV5.6.exe
-
log_directory
WindowsUPDLogs
-
reconnect_delay
3000
-
startup_key
Windows BIOS Update Checker
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource Client-deobf.exe.bin
Files
-
Client-deobf.exe.bin.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ