General
-
Target
Solara.exe
-
Size
3.1MB
-
MD5
bb25b87f0d78eb58be5fb7ac6221fc70
-
SHA1
57cb6fa31127e0b260507a59f5f48207aa25bda6
-
SHA256
cd7838194de3cc5ce85407eec4dc551cb4b4b2997a0eda7ca4921e6bff671022
-
SHA512
0222aecb19f3f03ef57ed0e73d65f5b0ed195198bb867586749a966f8ac52d5408ec93dc7b674da6e17bae0e738017b87d71d72d9452f5782837058ca2507e42
-
SSDEEP
49152:WvLI22SsaNYfdPBldt698dBcjHiFJ2z+aMfLoGQLTHHB72eh2NT:Wv022SsaNYfdPBldt6+dBcjHUUzY
Malware Config
Extracted
quasar
1.4.1
Solara
192.168.2.7:4782
ba289919-4af8-43d2-be0b-3679799e271e
-
encryption_key
5CB4194C3DC77CEBBAAFFDE65567F2110D147148
-
install_name
Solara.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Solara.exe
Files
-
Solara.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ