Behavioral task
behavioral1
Sample
Client-built2.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Client-built2.exe
Resource
win10v2004-20240426-en
General
-
Target
Client-built2.exe
-
Size
3.1MB
-
MD5
822eed302ff25105073dfb79ea894215
-
SHA1
2e5153d66fdc1837b387bf33a2292f6f2ec474d5
-
SHA256
397bd422af47cc0511d28b77593f1d768864ff7f76765fc778d9dc3115dc0f98
-
SHA512
fc89bc8d9ed1a7bdb4163222d59ec345a0e039c4fc0475467e91211e9a15bd5aa6436bf36062e1487fd6d3bad06b1aebea8e41360f559348c3c4cafcbfa16e2a
-
SSDEEP
49152:KvyI22SsaNYfdPBldt698dBcjHk5xNESE5k/i0LoGdLTHHB72eh2NT:Kvf22SsaNYfdPBldt6+dBcjHaxE6
Malware Config
Extracted
quasar
1.4.1
dusan
192.168.178.20:4782
ded81f24-0e54-4985-a1fb-e180db45c27d
-
encryption_key
A81486939BB2FAD2A02EAF76B26242A2A9C6D91B
-
install_name
katani.exe
-
log_directory
Log
-
reconnect_delay
3000
-
startup_key
hacked by katani :)
-
subdirectory
download
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource Client-built2.exe
Files
-
Client-built2.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ