Behavioral task
behavioral1
Sample
2a700406a42a06541dfee93faa1079b51c7a899e3cffcbc31390473852d7e5cc.exe
Resource
win7-20240903-en
General
-
Target
42f1ecb6f9e2f73bb66e84e5f8ca4fb4.bin
-
Size
122KB
-
MD5
ef1f247a8ada6b819671c41903375d55
-
SHA1
ebe0c341a8b013537f2988623639b7f489a8c4ef
-
SHA256
4aa1ef6600a523f37a28a4d472080741093f629b037ba189bc79a1b6f8ab6a4c
-
SHA512
310a10a06e70c63ec463110d3723952e090abce5130cc3e30ab20ba0f90d28515075c061e8d6a1c4b15b9df96e6d4323133a531882ed03fbffce3c9f954895be
-
SSDEEP
3072:V4+zsLRFJAy1Za+N3xwVqnK8FLDn8+bESD6RYUtBZTB/jHEM3:JY1puN8VZbZD65vThb3
Malware Config
Extracted
quasar
1.4.0.0
Office
45.136.51.217:5173
fJtDNXkZg2XmnSxFi9
-
encryption_key
7Ds8HmxRNTT7TqM6R6Sm
-
install_name
csrss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
NET framework
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule static1/unpack001/2a700406a42a06541dfee93faa1079b51c7a899e3cffcbc31390473852d7e5cc.exe family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/2a700406a42a06541dfee93faa1079b51c7a899e3cffcbc31390473852d7e5cc.exe
Files
-
42f1ecb6f9e2f73bb66e84e5f8ca4fb4.bin.zip
Password: infected
-
2a700406a42a06541dfee93faa1079b51c7a899e3cffcbc31390473852d7e5cc.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 285KB - Virtual size: 285KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ