General
-
Target
Virus.exe
-
Size
348KB
-
MD5
325f748d4e40fd993021c4a39e60384d
-
SHA1
665c5980233d2081ecb638a5601950da52aec632
-
SHA256
f3d4f0a9c0f837998e9ac15b067a74fa15cea74db186e1067fd55eea657ae3f3
-
SHA512
5dfadcb320f93d8990e70f219cb6ecfeb0e8dc0bb90e3dbdbe4977e0ce8b029a1aeab91f272476f1dbab16191be287d072d8cfedd550893c9bdde268b1e02f95
-
SSDEEP
6144:s16bPXhLApfp07Dbj82MGlfCtfb5vJtTamdYxM4HX2vuJrq:QmhApSPeFKmd4rHXXrq
Malware Config
Extracted
quasar
1.3.0.0
hackeado papu
dbxs31c.localto.net:5853
QSR_MUTEX_Da9VX0BUJqFSTadPhi
-
encryption_key
jmEyWTm6K6eGLE8Q3C6X
-
install_name
Windows.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
Processes:
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource Virus.exe
Files
-
Virus.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 344KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ