C:\projects\globalmousekeyhook\MouseKeyHook\obj\Debug\Gma.System.MouseKeyHook.pdb
Overview
overview
10Static
static
10Apex-ghost...ss.exe
windows7-x64
10Apex-ghost...ss.exe
windows10-2004-x64
10Apex-ghost...ok.dll
windows7-x64
1Apex-ghost...ok.dll
windows10-2004-x64
1Apex-ghost...E).bat
windows7-x64
1Apex-ghost...E).bat
windows10-2004-x64
1Apex-ghost...re.dll
windows7-x64
1Apex-ghost...re.dll
windows10-2004-x64
1Behavioral task
behavioral1
Sample
Apex-ghostware-apex-hacks/EasyAntiCheatBypass.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Apex-ghostware-apex-hacks/EasyAntiCheatBypass.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Apex-ghostware-apex-hacks/Gma.System.MouseKeyHook.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
Apex-ghostware-apex-hacks/Gma.System.MouseKeyHook.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
Apex-ghostware-apex-hacks/Loader(OPENME).bat
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
Apex-ghostware-apex-hacks/Loader(OPENME).bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Apex-ghostware-apex-hacks/ghostware.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
Apex-ghostware-apex-hacks/ghostware.dll
Resource
win10v2004-20240611-en
General
-
Target
4e85fc6b1d7119195b46633bd051c65074eebf181d8f9cd142ecc0e7a9bcc3b8.zip
-
Size
1.2MB
-
MD5
56819905506b605b88d2e6513c91bc25
-
SHA1
f64b5b5cdb72eabd3ba9ddcd3fbfa2a7211caa6c
-
SHA256
4e85fc6b1d7119195b46633bd051c65074eebf181d8f9cd142ecc0e7a9bcc3b8
-
SHA512
6119b9e1d88ce5b1b3158626b3ba5848fa133fc271798057f4404600bd8313efd7462b85be54fd661a859ae0a79449d1c19962edfb4b857fe7a7ceade55d249c
-
SSDEEP
24576:rcBRbNL4fPXUkIl3dxjG6077tJ/qcZA6eUBkaCZTF8OyKBK/Q+sWk1muMvGh/JIY:rcBYfPEBltAZccZA6jka+9yKBK4+7XuD
Malware Config
Extracted
quasar
1.4.1
ApexV1
174.175.46.53:1048
c8ba5d8f-6f83-4ae3-ae6c-d1a644d2c509
-
encryption_key
B0ABE169C55CFD4C2E8310DB36202EAF0E98D48D
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
1500
-
startup_key
Windows Updater Service
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule static1/unpack001/Apex-ghostware-apex-hacks/EasyAntiCheatBypass.exe family_quasar -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/Apex-ghostware-apex-hacks/EasyAntiCheatBypass.exe unpack001/Apex-ghostware-apex-hacks/Gma.System.MouseKeyHook.dll unpack001/Apex-ghostware-apex-hacks/ghostware.dll
Files
-
4e85fc6b1d7119195b46633bd051c65074eebf181d8f9cd142ecc0e7a9bcc3b8.zip.zip
-
Apex-ghostware-apex-hacks/EasyAntiCheatBypass.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Apex-ghostware-apex-hacks/Gma.System.MouseKeyHook.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Apex-ghostware-apex-hacks/Loader(OPENME).bat
-
Apex-ghostware-apex-hacks/README.md
-
Apex-ghostware-apex-hacks/ghostware.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\src\cecil\symbols\pdb\obj\Release\net40\Mono.Cecil.Pdb.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ