Behavioral task
behavioral1
Sample
nw.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
nw.exe
Resource
win10v2004-20240802-en
General
-
Target
nw.txt
-
Size
3.1MB
-
MD5
9aee6e6aee46936d5f11683b56a4635d
-
SHA1
27a72d3f6afca56af1d7a30aaaab6b1a325b27f6
-
SHA256
92d9ebb2cc404dd5121be01e08fbdff816eb49436389e34de43c2183b891026f
-
SHA512
e14709f290097fa1b9e2510ec02c3f2804d4cc0af81c60ca91fc957f22709e5c596636f9343b8dac118cc519e32c2e33e221566fb5ae422c29cf128948b1c25f
-
SSDEEP
49152:DvzvE2H5aweBHPbl6T/yGaqA6/VDRJ6ybR3LoGd5THHB72eh2NT:DvDE2H5aweBHPbl6T/DaqA6/VDRJ6s
Malware Config
Extracted
quasar
1.4.1
Certificado2
pajarito25.freedynamicdns.org:8081
pajarito25.freedynamicdns.org:8080
181.162.137.153:8080
88f93dd2-cb79-4fea-a5bd-8f08ceaa72d7
-
encryption_key
2F7DB670272D6A3F2B9C56A67A873128BBC93653
-
install_name
localcert.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
localcert
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource nw.txt
Files
-
nw.txt.exe windows:4 windows x86 arch:x86
Password: 1234
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ