Behavioral task
behavioral1
Sample
1824-1095-0x0000000000400000-0x0000000000724000-memory.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1824-1095-0x0000000000400000-0x0000000000724000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
1824-1095-0x0000000000400000-0x0000000000724000-memory.dmp
-
Size
3.1MB
-
MD5
68624c921d6b6d4eee3bcedb71c23f69
-
SHA1
21deb415cd228265bcb3dc77f0a7bd2edbd92bf9
-
SHA256
5ea71716c28c739b7cb68cb26ac8ef2edc56ed4a551922d24bf4abbcdf4aef68
-
SHA512
ab13b790363548d353d40e59b4d8670beefcbd7c48d789ed32e394a39729d2974ddb8adca7a21b4e9ed1c268c0f581f9ed85dfc7ecc650695b1a8072670c1410
-
SSDEEP
49152:Ovdt62XlaSFNWPjljiFa2RoUYIaxcEf8ik/JaNoGdHTHHB72eh2NT:Ovf62XlaSFNWPjljiFXRoUYIaxqY
Malware Config
Extracted
quasar
1.4.1
CHING-CHONG
goooooooool.com:1337
771ac64-b9299-43dc-b9229-3a828da05
-
encryption_key
1FBC2542A1A2F356C726019FD7BD6FEA628A4E1A
-
install_name
shellhost.exe
-
log_directory
syslogs
-
reconnect_delay
3333
-
startup_key
ShellHost
-
subdirectory
Code
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1824-1095-0x0000000000400000-0x0000000000724000-memory.dmp
Files
-
1824-1095-0x0000000000400000-0x0000000000724000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ