Behavioral task
behavioral1
Sample
83892117f96867db66c1e6676822a4c0d6691cde60449ee47457f4cc31410fce.exe
Resource
win7-20240221-en
General
-
Target
fe4ed0e2c6d830596d168ee32dc8a44239ca1705635187f67a0e40234c0f4c14
-
Size
180KB
-
MD5
0f97ded4f9f47b2e869905c0d09825cc
-
SHA1
9c299a70a7371d1203f0e38e8d71ee1436f20808
-
SHA256
fe4ed0e2c6d830596d168ee32dc8a44239ca1705635187f67a0e40234c0f4c14
-
SHA512
50b713a2b014ca9c3bd6234d93bdf93ab69abc42f6d1da7dd63fd7bf10e3ccdc8c05f0779d973c6e0f0e842d5043607d4fa7d80dd0c21ecb9fffa56be798187c
-
SSDEEP
3072:GZ+S8N2b0QchgAem/QFQn0p/OPqeMSyMZqMpJjiqDZ59BGEYB91nNl2zrwAcL/Nt:g+S8I4om/xn0EPuMq2JjiqL9RYlNlLNt
Malware Config
Extracted
quasar
1.3.0.0
Office04
qztadmin.duckdns.org:9782
QSR_MUTEX_YMblzlA3rm38L7nnxQ
-
encryption_key
mDf8ODHd9XwqMsIxpY8F
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule static1/unpack001/83892117f96867db66c1e6676822a4c0d6691cde60449ee47457f4cc31410fce.exe family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/83892117f96867db66c1e6676822a4c0d6691cde60449ee47457f4cc31410fce.exe
Files
-
fe4ed0e2c6d830596d168ee32dc8a44239ca1705635187f67a0e40234c0f4c14.zip
Password: infected
-
83892117f96867db66c1e6676822a4c0d6691cde60449ee47457f4cc31410fce.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 344KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ