Behavioral task
behavioral1
Sample
de12e80e3c73e42c3fd656d5dae906f0N.exe
Resource
win7-20240903-en
General
-
Target
de12e80e3c73e42c3fd656d5dae906f0N
-
Size
503KB
-
MD5
de12e80e3c73e42c3fd656d5dae906f0
-
SHA1
73038cb597ccfeec64baa3dddc05c42232c158fd
-
SHA256
515ec08542e9f12e1fa3f77af62e55d1cd7df51037c7fe82be4566081d3576a4
-
SHA512
18922a9534e4bd09c577fae858bb355ec2aeac06f38576806be1265ef44880f819d22e3ee744f468a8eb57df54c622f8c8e81b84ad09b252fa19e360c1a5d1e4
-
SSDEEP
12288:pTEgdfYWxUyPPz+1TM4FywM1pVDReJicdP:qUw+PStywM1p5ReJicdP
Malware Config
Extracted
quasar
1.4.0
GIAHUY
14.225.254.32:9090
18e8c78f-45c1-4c27-922e-e5c7c18bdf6f
-
encryption_key
677BA3CA93A14ED21921E76CDFAADEF9D4E79629
-
install_name
svchosts.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Realtek
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de12e80e3c73e42c3fd656d5dae906f0N
Files
-
de12e80e3c73e42c3fd656d5dae906f0N.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 498KB - Virtual size: 497KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ