General
-
Target
240720-y5ys5aybkl_pw_infected.zip
-
Size
1.3MB
-
MD5
305402bef218b8b6754d9a2aa1c2bb14
-
SHA1
fb48fcadc5092ca7302d2fe6cd4504b29013256e
-
SHA256
39e6d1d301f47e128ba66531bb7c3ab942a98149af46bc98bfcbc8af2dddd170
-
SHA512
4fbaebda05e5e9b56114e6d6e9cfec65f7c76ca74a5efd54ca22decdf08661fc32709c9644954d26698b2e4596a8cfe869667c4c671eccb38c2d3222bf82b767
-
SSDEEP
24576:HTBmyi8DMaeKj7A8McuOVb20EM5gWrHtuIH6HMrHCRtGmVsAcgUpuI7az:LP7rMcjyYrNuIHmMrHCRtGmVs9gUpu3
Malware Config
Extracted
quasar
1.4.1
Solara
thssdxf6y74-54495.portmap.host:54495
b5404b50-f626-49b9-8b08-b7ac4b28d57b
-
encryption_key
CFE12BEE480308179907A97B8F57771DDA407795
-
install_name
Solara V3.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java Updater
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule static1/unpack001/Solara V3.exe family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Solara V3.exe
Files
-
240720-y5ys5aybkl_pw_infected.zip.zip
Password: infected
-
Solara V3.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 235KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ