Behavioral task
behavioral1
Sample
0aa9c1791f32d5f01741cd43b3433970_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
0aa9c1791f32d5f01741cd43b3433970_NeikiAnalytics
-
Size
348KB
-
MD5
0aa9c1791f32d5f01741cd43b3433970
-
SHA1
ccd00df6d2461cafc8b1a9c99439de2a61cf1f4a
-
SHA256
0cfb63a10f1b80b5ffc7547f31e66bb4a3cfb216cddbd0967a929dcecbd0bc35
-
SHA512
7fddb38d4e9b52317afd3ba48733347551e293a4a26150c7cb6be46c62a688ea9916b9ad2b8d47a0c285bcff7c3d90ff57bc7fbb4701388a18d30a3caa2d7dc4
-
SSDEEP
6144:K++qQ4i1FFiEKZZ69jDbOby8YkDPxHtO/7EIa:gplir6l//nQPJtC7EIa
Malware Config
Extracted
quasar
1.3.0.0
Victim
91.122.60.255:4782
QSR_MUTEX_hvw90hLuFOtv0Kig6i
-
encryption_key
hnFV3eO5HAJCHDY9IUGv
-
install_name
MicrosoftMonitor.exe
-
log_directory
Logs
-
reconnect_delay
300
-
startup_key
MicrosoftMonitor
-
subdirectory
WindowsDrv
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 0aa9c1791f32d5f01741cd43b3433970_NeikiAnalytics
Files
-
0aa9c1791f32d5f01741cd43b3433970_NeikiAnalytics.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 344KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ