C:\projects\globalmousekeyhook\MouseKeyHook\obj\Debug\Gma.System.MouseKeyHook.pdb
Behavioral task
behavioral1
Sample
Apex-ghostware-main/EasyAntiCheatBypass.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Apex-ghostware-main/Gma.System.MouseKeyHook.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Apex-ghostware-main/Loader(OPENME).bat
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
Apex-ghostware-main/ghostware.dll
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
Apex-ghostware-main/loader(OPENME).bat
Resource
win10-20240404-en
General
-
Target
Apex-ghostware-main.zip
-
Size
1.2MB
-
MD5
cfc397c1d70de15c89ba2a7e0bd3b645
-
SHA1
ae71208f3fdb7082096565810873f009cd13e2d1
-
SHA256
d073528988321031eb5068a95465d63d400cf8d155baf040523c136276815d90
-
SHA512
413d70b9f4db46f2e973c22800940dc242a35afed828814079b658122ddab940b5b9d98fd9b212fe76c1501a20e4e174b9d3053b72a45d58e649aee2dd2fa895
-
SSDEEP
24576:lcBRbNL4fPXUkIl3dxjG6077tJ/qcZA6eUBkaCZTF8OyKBK/Q+sWk1muMvGh/Jmt:lcBYfPEBltAZccZA6jka+9yKBK4+7XuW
Malware Config
Extracted
quasar
1.4.1
ApexV1
174.175.46.53:1048
c8ba5d8f-6f83-4ae3-ae6c-d1a644d2c509
-
encryption_key
B0ABE169C55CFD4C2E8310DB36202EAF0E98D48D
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
1500
-
startup_key
Windows Updater Service
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule static1/unpack001/Apex-ghostware-main/EasyAntiCheatBypass.exe family_quasar -
Unsigned PE 3 IoCs
Checks for missing Authenticode signature.
resource unpack001/Apex-ghostware-main/EasyAntiCheatBypass.exe unpack001/Apex-ghostware-main/Gma.System.MouseKeyHook.dll unpack001/Apex-ghostware-main/ghostware.dll
Files
-
Apex-ghostware-main.zip.zip
-
Apex-ghostware-main/EasyAntiCheatBypass.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Apex-ghostware-main/Gma.System.MouseKeyHook.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Apex-ghostware-main/Loader(OPENME).bat
-
Apex-ghostware-main/README.md
-
Apex-ghostware-main/ghostware.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PDB Paths
C:\src\cecil\symbols\pdb\obj\Release\net40\Mono.Cecil.Pdb.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Apex-ghostware-main/loader(OPENME).bat