Behavioral task
behavioral1
Sample
3168-1096-0x0000000000400000-0x0000000000724000-memory.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3168-1096-0x0000000000400000-0x0000000000724000-memory.exe
Resource
win10v2004-20241007-en
General
-
Target
3168-1096-0x0000000000400000-0x0000000000724000-memory.dmp
-
Size
3.1MB
-
MD5
f9a99b027da7c75e5c0b636f6c65378b
-
SHA1
5b0aa8cb5c84310cb505316463a7dc9fc79abd16
-
SHA256
4a0b10b59bd6d77ab17d3dc695b36a6364377b8e86e0d9dc200ea0335f7fbd7f
-
SHA512
b900511803022277d24db847da5f6e6ec9df01069478e599f3f14a5649072a2be1a4f1e2c3e4b0fb313ce94f0f94a53a02bd419234baff4c8ec3bd519bf14815
-
SSDEEP
49152:3vLI22SsaNYfdPBldt698dBcjHLqRJ6HbR3LoGdSqTHHB72eh2NT:3v022SsaNYfdPBldt6+dBcjHLqRJ6Z
Malware Config
Extracted
quasar
1.4.1
man
nwamama.ydns.eu:3791
3302836a-f2f9-4646-981e-42b54ed610dd
-
encryption_key
C058A6A166AF85C9027394334AA2BDC41A9B7D9C
-
install_name
windows update.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Svchost
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 3168-1096-0x0000000000400000-0x0000000000724000-memory.dmp
Files
-
3168-1096-0x0000000000400000-0x0000000000724000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ