Behavioral task
behavioral1
Sample
420069995f69b06e89dc9a8eb7f60450_NeikiAnalytics.exe
Resource
win7-20240508-en
General
-
Target
420069995f69b06e89dc9a8eb7f60450_NeikiAnalytics.exe
-
Size
3.1MB
-
MD5
420069995f69b06e89dc9a8eb7f60450
-
SHA1
03567ec7091b9197d9c66139201965e8603a5473
-
SHA256
0d7087e1dedf2549817b3a07cc8a0875675c34367233089d0c5d372b20eec847
-
SHA512
6f78c3d8a1342bc332b0c6da9101f6477255b2c64ce7981fef2d83c019c65bc92e8ee1fca1654bf247706b7d4617386545bef2804f6188e97ebf69f3b105476c
-
SSDEEP
49152:uvRt62XlaSFNWPjljiFa2RoUYIQ4mXmzsLoGd5SnTHHB72eh2NT:uvb62XlaSFNWPjljiFXRoUYIQ4mN
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.9:4782
c966d877-40e6-488c-8bd6-fff2d98fa0fe
-
encryption_key
1FC99B78C10AD07DDB427EA5666C95B4E35D47F8
-
install_name
damn.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
damn
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 420069995f69b06e89dc9a8eb7f60450_NeikiAnalytics.exe
Files
-
420069995f69b06e89dc9a8eb7f60450_NeikiAnalytics.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ