Malicious
Malicious

53326accbfc77353bbf20aa2e91a8d6f

PE Executable
|
MD5: 53326accbfc77353bbf20aa2e91a8d6f
|
Size: 376.84 KB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Medium

Hash
Hash Value
MD5
53326accbfc77353bbf20aa2e91a8d6f
Sha1
0b00be42f665c108679ff46af97591a26d6658e9
Sha256
f5d67e02e786e8d6b15b3247d3f4ae5f622c4444a4c817e7aebbafaa9d2f7425
Sha384
76bd36c8c2f26b6d331a0b1424af1ff51924c346d47312ca011cae81b38f43c052cab48abbbd7c1a50eb629430a2d1ec
Sha512
5f5cecdd0a97d4449cfbe375c00a67cce7d67de6e199504099142d3f6adafcabf3b9b57b3a44817d113f79fe80c86f9abbf70b305b96eb1df8da7645d850a96f
SSDeep
6144:lfqQ4i1FFiEKAwpbYCGz7nLz06bx4owfah8TblNMt31CYK:RpliVbYpn8C4owfaSdNMt31CYK
TLSH
7E849C1333A8D93BD1FE173AF4360A184BB1D457B616F38B5A5A55B82D233868D903B3

PeID

Microsoft Visual C# / Basic .NET
File Structure
.Net Resources
xClient.Properties.Resources.resources
information
[NBF]root.Data
[NBF]root.Data-preview.png
Malware Configuration - QuasarRAT config.
Config. Field
Value
Conf. AES-Salt

BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41

Conf. AES-Key

BO3REHj6wQEl6olanjuI

Conf. AES-Salt

BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41

Port

34.

Host

34.

Conf. AES-Key

BO3REHj6wQEl6olanjuI

Version

1.3.0.0

Port

434

Host

windows10-11.duckdns.org

ReconnectDelay

2999

Key

oXCnUiPgBL0sy3Tlv+F8LQ==

AuthKey

h36LUNE6D6Y9hpohEF6YNS5bniF/Glgol+St+nwGv2QBfXWLmUsLx5aanXm2PRFz2aY54a//jMvBGR9l4hF9Vg==

SubDirectory

up

InstallName

jstat.exe

Install

0

Startup

0

Mutex

QSR_MUTEX_wizqga

StartupKey

Windows Protecte

HideFile

1

EnableLogger

1

Tag

Kanjal

LogDirectory

ogl

HideLogDirectory

0

HideLogSubdirectory

1

Informations
Name
Value
Info

PE Detect: PeReader FAIL, AsmResolver Mapped OK

Info

Remap: Mapped -> FileLayout (RAM only) as [Rebuild from dump]_d4d27e51.exe

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::Main(System.String[])

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.3.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0,Profile=Client

Total Strings

896

Main Method

System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::Main(System.String[])

Main IL Instruction Count

19

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.AppDomain System.AppDomain::get_CurrentDomain() ldnull <null> ldftn System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::터솴䬑˦塩ᢄ苪貇胧�뗽䪡黁竪Ⰿ⽷Ɵ尠(System.Object,System.UnhandledExceptionEventArgs) newobj System.Void System.UnhandledExceptionEventHandler::.ctor(System.Object,System.IntPtr) callvirt System.Void System.AppDomain::add_UnhandledException(System.UnhandledExceptionEventHandler) call System.Boolean 꿭ꒌ휚ﱘ�炢蟆瀟⚓搱‰箯ຎ�箩꼧::嶢戯�Ⰺ蔖彄娠ᚈ媊봜槬标략趪�쁅콠() brfalse.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹꟜ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Boolean পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::흁儶栄郻鋐牘囔쁍䢃鞽㶺뜌폖㊥镔ꥨ降켱() brfalse.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹꟜ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Boolean 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ::get_Exiting() brtrue.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹꟜ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() ldsfld 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::┽ᣠ禳ὼ쒠넠�ㆳ煼鰼첟듽ッ⎅먞ջ㛦룸 callvirt System.Void 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ::꣥彩栣ퟣ꤬誝歕ࢦ㨣ක⟴鐞㤠놢斯좤ᦺԸ觪() call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹꟜ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::❫Ꞃ砽对໨쵰挃ꧽ饌蔅践㥢影䟜뢝ꖙ槒业ꈿ() ret <null>

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::Main(System.String[])

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.3.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0,Profile=Client

Total Strings

896

Main Method

System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::Main(System.String[])

Main IL Instruction Count

19

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.AppDomain System.AppDomain::get_CurrentDomain() ldnull <null> ldftn System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::터솴䬑˦塩ᢄ苪貇胧�뗽䪡黁竪Ⰿ⽷Ɵ尠(System.Object,System.UnhandledExceptionEventArgs) newobj System.Void System.UnhandledExceptionEventHandler::.ctor(System.Object,System.IntPtr) callvirt System.Void System.AppDomain::add_UnhandledException(System.UnhandledExceptionEventHandler) call System.Boolean 꿭ꒌ휚ﱘ�炢蟆瀟⚓搱‰箯ຎ�箩꼧::嶢戯�Ⰺ蔖彄娠ᚈ媊봜槬标략趪�쁅콠() brfalse.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹꟜ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Boolean পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::흁儶栄郻鋐牘囔쁍䢃鞽㶺뜌폖㊥镔ꥨ降켱() brfalse.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹꟜ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Boolean 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ::get_Exiting() brtrue.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹꟜ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() ldsfld 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::┽ᣠ禳ὼ쒠넠�ㆳ煼鰼첟듽ッ⎅먞ջ㛦룸 callvirt System.Void 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ::꣥彩栣ퟣ꤬誝歕ࢦ㨣ක⟴鐞㤠놢斯좤ᦺԸ觪() call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹꟜ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::❫Ꞃ砽对໨쵰挃ꧽ饌蔅践㥢影䟜뢝ꖙ槒业ꈿ() ret <null>

Artefacts
Name
Value
CnC

windows10-11.duckdns.org

Port

434

CnC

34.

Port

34.

PE Layout

MemoryMapped (process dump suspected)

CnC

windows10-11.duckdns.org

Port

434

CnC

34.

Port

34.

PE Layout

MemoryMapped (process dump suspected)

53326accbfc77353bbf20aa2e91a8d6f (376.84 KB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙