Behavioral task
behavioral1
Sample
5080-55-0x0000000000400000-0x0000000000724000-memory.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5080-55-0x0000000000400000-0x0000000000724000-memory.exe
Resource
win10v2004-20240226-en
General
-
Target
5080-55-0x0000000000400000-0x0000000000724000-memory.dmp
-
Size
3.1MB
-
MD5
05777f40a0290ab62f240f51b6aa6b07
-
SHA1
bfa8be9f83b18f862b302a8edf05f243afacb2e6
-
SHA256
35f4ef78b3818179e9037141a1e41280e8a972c7e4ffd9fe32224eb128b1f3ab
-
SHA512
d2f1d900461703a9f1676940ecc724026ef6d04a7bb4a7ed207d2d4f2aad1a5cee4c9267e7c1f249c0a4abf35103c335b962d14fa355b5650b4b7363609f4ba3
-
SSDEEP
49152:ivYt62XlaSFNWPjljiFa2RoUYIt7RJ61bR3LoGdDM8THHB72eh2NT:iv062XlaSFNWPjljiFXRoUYIt7RJ6HA
Malware Config
Extracted
quasar
1.4.1
Quack
51.79.171.174:1337
07a03746-8e2d-46fb-91ff-f614dfb5f3bb
-
encryption_key
CFB4F4CA022C9B6355A56391E851519D74D8996A
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
Windows
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5080-55-0x0000000000400000-0x0000000000724000-memory.dmp
Files
-
5080-55-0x0000000000400000-0x0000000000724000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ