Behavioral task
behavioral1
Sample
BypasserRunFirst.exe
Resource
win7-20241010-en
General
-
Target
BypasserRunFirst.exe
-
Size
3.1MB
-
MD5
2c39f6ceea730bcfd551fb106fddf974
-
SHA1
5fbb018bd30429085f0309503901e04625a8847b
-
SHA256
7dcda14173a0d102d6a02d290cbba10bd8a70e689375700bf0f322ea500c11c2
-
SHA512
5a24f72f34170f3396524d062c4ae63c4f8ca6766783aeb730c063a8e8dff36a95f2054d45a3c9e0b5292818f70dc9bd7e2c65bb2f573537241d4f8c438fbbad
-
SSDEEP
49152:SvLlL26AaNeWgPhlmVqvMQ7XSKuiSg1J/VoGd0hTHHB72eh2NT:SvxL26AaNeWgPhlmVqkQ7XSKuiSO
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.3.210:4782
66e2d8be-f2d1-430b-a858-bea567f34e0d
-
encryption_key
6DDF2A1446CC876583B8AB188D7732CB160FAE85
-
install_name
TemperSpoferByCapyLovers.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 1 IoCs
resource yara_rule sample family_quasar -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource BypasserRunFirst.exe
Files
-
BypasserRunFirst.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ