Malicious
Malicious

954592a840bed61ea6173fa147262760

PE Executable
|
MD5: 954592a840bed61ea6173fa147262760
|
Size: 376.84 KB
|
application/x-dosexec


Print
Infection Chain
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Medium

Hash
Hash Value
MD5
954592a840bed61ea6173fa147262760
Sha1
285d074bffae8b6e9b898681f3bdd689c49627fb
Sha256
90ceb85e5df35233e231eaf51600a50722d627c8ba713519cff6fc7b7414bb2f
Sha384
7a9404bfcdac73217a7f41a46bd09911fab4410a5edd377647704616f00428bca2837f42c7285952fcd557dbc1993aa4
Sha512
bd447c7ef8da21258fecc64e829937c8dc36192be574c5a761978757433a94af3c10aa1de997883ec270392784d51741e17fd5302109c31771c7326c415c5d83
SSDeep
6144:6fqQ4i1FFiEKAwpbYCGz7nLz06bx4owfah8TblNMt31CYK:kpliVbYpn8C4owfaSdNMt31CYK
TLSH
D0849C1333A8D93BD1FE173AF4360A184BB1D457B616F38B5A5A55B82D233868D903B3

PeID

Microsoft Visual C# / Basic .NET
File Structure
.Net Resources
xClient.Properties.Resources.resources
information
[NBF]root.Data
[NBF]root.Data-preview.png
Malware Configuration - QuasarRAT config.
Config. Field
Value
Conf. AES-Salt

BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41

Conf. AES-Key

BO3REHj6wQEl6olanjuI

Conf. AES-Salt

BF-EB-1E-56-FB-CD-97-3B-B2-19-02-24-30-A5-78-43-00-3D-56-44-D2-1E-62-B9-D4-F1-80-E7-E6-C3-39-41

Port

34.

Host

34.

Conf. AES-Key

BO3REHj6wQEl6olanjuI

Version

1.3.0.0

Port

434

Host

windows10-11.duckdns.org

ReconnectDelay

2999

Key

oXCnUiPgBL0sy3Tlv+F8LQ==

AuthKey

h36LUNE6D6Y9hpohEF6YNS5bniF/Glgol+St+nwGv2QBfXWLmUsLx5aanXm2PRFz2aY54a//jMvBGR9l4hF9Vg==

SubDirectory

up

InstallName

jstat.exe

Install

0

Startup

0

Mutex

QSR_MUTEX_wizqga

StartupKey

Windows Protecte

HideFile

1

EnableLogger

1

Tag

Kanjal

LogDirectory

ogl

HideLogDirectory

0

HideLogSubdirectory

1

Informations
Name
Value
Info

PE Detect: PeReader FAIL, AsmResolver Mapped OK

Info

Remap: Mapped -> FileLayout (RAM only) as [Rebuild from dump]_3558d2f3.exe

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::Main(System.String[])

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.3.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0,Profile=Client

Total Strings

896

Main Method

System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::Main(System.String[])

Main IL Instruction Count

19

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.AppDomain System.AppDomain::get_CurrentDomain() ldnull <null> ldftn System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::터솴䬑˦塩ᢄ苪貇胧�뗽䪡黁竪Ⰿ⽷Ɵ尠(System.Object,System.UnhandledExceptionEventArgs) newobj System.Void System.UnhandledExceptionEventHandler::.ctor(System.Object,System.IntPtr) callvirt System.Void System.AppDomain::add_UnhandledException(System.UnhandledExceptionEventHandler) call System.Boolean 꿭ꒌ휚ﱘ�炢蟆瀟⚓搱‰箯ຎ�箩꼧::嶢戯�Ⰺ蔖彄娠ᚈ媊봜槬标략趪�쁅콠() brfalse.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹꟜ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Boolean পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::흁儶栄郻鋐牘囔쁍䢃鞽㶺뜌폖㊥镔ꥨ降켱() brfalse.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹꟜ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Boolean 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ::get_Exiting() brtrue.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹꟜ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() ldsfld 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::┽ᣠ禳ὼ쒠넠�ㆳ煼鰼첟듽ッ⎅먞ջ㛦룸 callvirt System.Void 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ::꣥彩栣ퟣ꤬誝歕ࢦ㨣ක⟴鐞㤠놢斯좤ᦺԸ觪() call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹꟜ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::❫Ꞃ砽对໨쵰挃ꧽ饌蔅践㥢影䟜뢝ꖙ槒业ꈿ() ret <null>

Module Name

Client.exe

Full Name

Client.exe

EntryPoint

System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::Main(System.String[])

Scope Name

Client.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Client

Assembly Version

1.3.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0,Profile=Client

Total Strings

896

Main Method

System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::Main(System.String[])

Main IL Instruction Count

19

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) call System.AppDomain System.AppDomain::get_CurrentDomain() ldnull <null> ldftn System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::터솴䬑˦塩ᢄ苪貇胧�뗽䪡黁竪Ⰿ⽷Ɵ尠(System.Object,System.UnhandledExceptionEventArgs) newobj System.Void System.UnhandledExceptionEventHandler::.ctor(System.Object,System.IntPtr) callvirt System.Void System.AppDomain::add_UnhandledException(System.UnhandledExceptionEventHandler) call System.Boolean 꿭ꒌ휚ﱘ�炢蟆瀟⚓搱‰箯ຎ�箩꼧::嶢戯�Ⰺ蔖彄娠ᚈ媊봜槬标략趪�쁅콠() brfalse.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹꟜ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Boolean পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::흁儶栄郻鋐牘囔쁍䢃鞽㶺뜌폖㊥镔ꥨ降켱() brfalse.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹꟜ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Boolean 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ::get_Exiting() brtrue.s IL_0040: call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹꟜ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() ldsfld 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::┽ᣠ禳ὼ쒠넠�ㆳ煼鰼첟듽ッ⎅먞ջ㛦룸 callvirt System.Void 雺⫾痹噴⟃Ⲹ╔퐵⢀잾㸊䅅竽뛮㕀躺ꋁ::꣥彩栣ퟣ꤬誝歕ࢦ㨣ක⟴鐞㤠놢斯좤ᦺԸ觪() call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::ퟶ畹玻ѯֹꟜ뼓餃瘥惉긲谼ܺﬤ쯡莂⾧ﻋ㤎() call System.Void পഅ⦉ꖨⓞ㏘琗醷㝪䇧꼴뷚荡ڻ糀횥귛譡::❫Ꞃ砽对໨쵰挃ꧽ饌蔅践㥢影䟜뢝ꖙ槒业ꈿ() ret <null>

Artefacts
Name
Value
CnC

windows10-11.duckdns.org

Port

434

CnC

34.

Port

34.

PE Layout

MemoryMapped (process dump suspected)

CnC

windows10-11.duckdns.org

Port

434

CnC

34.

Port

34.

PE Layout

MemoryMapped (process dump suspected)

954592a840bed61ea6173fa147262760 (376.84 KB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙