Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 15:57
Behavioral task
behavioral1
Sample
app1.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
app1.exe
-
Size
3.1MB
-
MD5
829605130c3b20269b5c56ca026241ab
-
SHA1
61f20276c524f8852911b027b95cecff5075e650
-
SHA256
fab76f9a2d47107dffa334b26f109cbe8a4f06ee8b936a622dc1f571e8412c23
-
SHA512
f097b0d4c461ae9fddb29cb42722041d78ef6a7bc01754fca72d321e8dd3359b41438be8639fa00c21f673ff0380ea9316b99dd648f47a4c6bdd6dc74fbc293b
-
SSDEEP
49152:KvWI22SsaNYfdPBldt698dBcjHaAaax7martAoGd8rtolTHHB72eh2NT:Kv722SsaNYfdPBldt6+dBcjHBp7ys
Malware Config
Extracted
Family
quasar
Version
1.4.1
Botnet
KDOTCrypt
C2
fedx.ddns.net:7000
Mutex
05ed390b-a98b-426c-bddb-fc4eab59ee87
Attributes
-
encryption_key
92470F4731518ABFA77DC89068544FB7E7B7C459
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/2656-1-0x0000000000080000-0x00000000003A4000-memory.dmp family_quasar -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2656 app1.exe