Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 10:09
Behavioral task
behavioral1
Sample
Client-Built.exe
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
Client-Built.exe
-
Size
3.1MB
-
MD5
832c32cbec14f7c575f8dde7713204b0
-
SHA1
c7892e4f47987566ed7fe47bb2e35362f96d24e9
-
SHA256
93b6b132ca4e190440d6fb64cc64f90fbd28d309fc389481ccb9ef83a49c0626
-
SHA512
f7980ee0f3dc1184ee65363178a66b3341c1a18593b33ead8ed76a08e3fe5bfb5f1afa91fe13b1e439c8010e0f197e505a20d4890aec16a95d3da0a117e21dc6
-
SSDEEP
49152:aI6WGoyH0I6ZUI9Iz6c/FJAAPcLPoGQNTHHB72eh2NTkS4:aI9Gdl6ZUI9UJ/8QcT
Malware Config
Extracted
Family
quasar
Version
1.4.1
Botnet
WormBurry
C2
147.185.221.20:15467
147.185.221.20:38852
Mutex
3f51338a-d72d-4e94-99b7-62b8774bafb8
Attributes
-
encryption_key
35D8C5468D502FD31B9068FF929210AF2F2ADC40
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Github.git
-
subdirectory
SubDir
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral2/memory/3924-1-0x0000000000D40000-0x0000000001064000-memory.dmp family_quasar -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\SubDir\ Client-Built.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3924 Client-Built.exe