Behavioral task
behavioral1
Sample
232-29-0x0000000000400000-0x00000000004EC000-memory.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
232-29-0x0000000000400000-0x00000000004EC000-memory.exe
Resource
win10v2004-20240709-en
General
-
Target
232-29-0x0000000000400000-0x00000000004EC000-memory.dmp
-
Size
944KB
-
MD5
c3ef3cf5ae7fe31c2f61cb77df6c5104
-
SHA1
5e6a00f3c756025224723f533951d8ee5920296a
-
SHA256
f8949f48028c5bbec90f6549986418a2be1ec8d18501b0ee38855a73f01c83c2
-
SHA512
5a04f7f5acc297d76f6efad569a753f727f950d00c25ce217a4da0279d54c611f5f2bd58a751bf34da9efc7be082f54e31cae96d365f8d6e9c1c6f9312fd3246
-
SSDEEP
24576:tmkdueXjq0OQKc2YSEegpQRDLusJLK1lkuoLP:IkdueXjq0OQKc2YSEegpshk1lk
Malware Config
Extracted
quasar
2.8.0.1
j4s0nツ
191.96.79.79:5552
k0xu0yaV18JcyOu4RW
-
encryption_key
dfDMgawnkTln5Mq1lzTq
-
install_name
Venom.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 232-29-0x0000000000400000-0x00000000004EC000-memory.dmp
Files
-
232-29-0x0000000000400000-0x00000000004EC000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 912KB - Virtual size: 912KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ