Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20231129-en
General
-
Target
Hello.zip
-
Size
1.2MB
-
MD5
833b554ced0a308dd74b615e8073d097
-
SHA1
f3b0051b2d81978d61d352b32522f73b4fca4ac2
-
SHA256
7e0c75a10e45e707e25ff968ddf24cb7ed73fd80ae49a04091a1a51f13bd1fb9
-
SHA512
644e5c2567490a7122afa3f757683ca4c455c34d882872784b7172dfb96537a84e7dde13b6c6bea745ea55f5f32267d5d0387e43c0a30069e12feb94d48635f7
-
SSDEEP
24576:xQ85IvumH74k0CKB1ny8ajigJov3s0c/PnCNBLreMraeHTsF:xZ5IfH74kJKrojHovs0cXq9y9GsF
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.1:4782
88.98.207.207:4782
192.168.1.211:4782
192.168.0.132:4782
2a01:4b00:b31a:3e00:d4a4:5f88:ab8:cc7d:4782
fd00::1617:c634:9b0b:2a22:4782
2a01:4b00:b31a:3e00:c7a:623f:eb1:3db6:4782
fd00::c7a:623f:eb1:3db6:4782
fe80::19ef:ec1a:f41f:39a5%5:4782
6d19d2f9-1235-4b10-a1dd-486dc3edd052
-
encryption_key
12AE26995FE0F312DC3ADA3C8CD142053AD088CA
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/Client-built.exe family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/Client-built.exe
Files
-
Hello.zip.zip
Password: ebola
-
Client-built.exe.exe windows:4 windows x86 arch:x86
Password: ebola
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ