Behavioral task
behavioral1
Sample
Windows.exe
Resource
win7-20240903-en
General
-
Target
Windows-virus.zip
-
Size
1.2MB
-
MD5
e40fa1f36296d7a2d6727d29e79e569f
-
SHA1
e5ef3afa225d7fa6c9a5268818e85af0cd84d92b
-
SHA256
0167056e31996433544969f92a7bd0e79e44c4a56660e9c054b23ef0d707bf23
-
SHA512
68b739369cd0a56d092eb62991a879a3679a74a47c2ac31a5a80aa1c2ef7dfcd26e5636ff57beb8c0c5be67b334c256f32d92a7d5ca227ccbd449809c302c0cf
-
SSDEEP
24576:g6Iw4L6y5A9kY6wqxMsN2FrqbaQoiPOP5x2BDERcjbeKxnF4GH03j:TIw4JEV652FrfxD+Dzw
Malware Config
Extracted
quasar
1.4.1
Pedo
82.65.180.207:5986
a4c2b814-ab22-4cf2-9f11-52931b6b15b3
-
encryption_key
6A4706C957DF851DA854AED16AB5CE4562B9C4D4
-
install_name
serv-microsoft.exe
-
log_directory
Logs
-
reconnect_delay
4000
-
startup_key
windows
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule static1/unpack001/Windows.exe family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Windows.exe
Files
-
Windows-virus.zip.zip
Password: virus
-
Windows.exe.exe windows:4 windows x86 arch:x86
Password: virus
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ