Behavioral task
behavioral1
Sample
41bd24fe8b67e9e3cd5bb272a07640de345c39f6cb6c4057491838de95dac6d7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
41bd24fe8b67e9e3cd5bb272a07640de345c39f6cb6c4057491838de95dac6d7.exe
Resource
win10v2004-20241007-en
General
-
Target
41bd24fe8b67e9e3cd5bb272a07640de345c39f6cb6c4057491838de95dac6d7.exe
-
Size
3.1MB
-
MD5
cf049d1ba0fceeb5348f71e15889fbc4
-
SHA1
94cc88586240456f777aed403d955027555db8d1
-
SHA256
41bd24fe8b67e9e3cd5bb272a07640de345c39f6cb6c4057491838de95dac6d7
-
SHA512
2e7a7d3415164cb453193fdceef02d46c35f9103521b33bc424c9b79659fac2e4b9deb0fe8754f0842546b51403181032b6c7a05116adfc4f2b8fd599c3ad6ed
-
SSDEEP
49152:avelL26AaNeWgPhlmVqvMQ7XSKIxOEMkek/JxwoGdeTHHB72eh2NT:avOL26AaNeWgPhlmVqkQ7XSKIxty
Malware Config
Extracted
quasar
1.4.1
RAT 5 (EPIC VERISON)
serveo.net:11453
7a1301f7-dc6f-4847-a8ee-ca627a9efa0f
-
encryption_key
3B793156AD6D884F51309D0E992DAA75D03D2783
-
install_name
Application Frame Host.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41bd24fe8b67e9e3cd5bb272a07640de345c39f6cb6c4057491838de95dac6d7.exe
Files
-
41bd24fe8b67e9e3cd5bb272a07640de345c39f6cb6c4057491838de95dac6d7.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ