General
-
Target
Loli.exe
-
Size
5.4MB
-
MD5
46307165e1f82a856c23e41090f8dc24
-
SHA1
5e9269c708993ba55e92d5aa7e3cd43dd10b9401
-
SHA256
31cf47322ffd34f77f48354d8b22eda7c1a78b0fec01e3e9989ae9131c6de3d8
-
SHA512
d98c8fb6830db10b738181adc2cdbbe7eedbefb047c5f7974dfdfbb2355ae4321285b31c5a57684e5a036f9655986907768de655681e108f956c7a99363eb9d6
-
SSDEEP
49152:aE/yEPsBimcZhhbGKnIXDpZEV/+hj45ZRDJ8BB6YCHHB72eh2Nw+NE:aELEBimcn2X9uV2WZJ
Malware Config
Extracted
quasar
-
encryption_key
E2FB9900B23756E2DDF30B24E44B0961BA7B0F9C
-
reconnect_delay
3000
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule sample family_quasar -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule sample agile_net -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource Loli.exe
Files
-
Loli.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 5.4MB - Virtual size: 5.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ