Behavioral task
behavioral1
Sample
451f300d14014ed0d89f00dde44295272d1672507a449a6106dc450493baa52e.exe
Resource
win7-20240221-en
General
-
Target
10fb9b71859bfc7ae5aff462a88ade70.bin
-
Size
180KB
-
MD5
3d55d02bb440a166db5661362b8e4d4f
-
SHA1
73f2570b4872f1fb47ad37def23a3829d53442f1
-
SHA256
693a95c5da78c75ee79e0c38dafc717a9b16089e05fb821c5310c48495834c38
-
SHA512
92ed24722c87f472a8cc12cf56fd687992be444c1092a5ce3885201b93364e77dd850b4fa7de61a30190f0e98ddc2b31e5cf1a664c2cc9d56e4b60da2764f41d
-
SSDEEP
3072:cvUddHboKcJAlWW8TN3Ba2r8OvhZuQAG9Cog0uDUGDfe0BWLh+VTEEyY+w:cvq1o3WsaOZuQAGkPUYfcLhAEEP
Malware Config
Extracted
quasar
1.3.0.0
PROXY
proxybreve.duckdns.org:4001
QSR_MUTEX_l1M93VuqIyiH8hEQ4I
-
encryption_key
Z3lsDT6GRXRES92YFSq8
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
1
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule static1/unpack001/451f300d14014ed0d89f00dde44295272d1672507a449a6106dc450493baa52e.exe family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/451f300d14014ed0d89f00dde44295272d1672507a449a6106dc450493baa52e.exe
Files
-
10fb9b71859bfc7ae5aff462a88ade70.bin.zip
Password: infected
-
451f300d14014ed0d89f00dde44295272d1672507a449a6106dc450493baa52e.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 344KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ