General

  • Target

    b7898c6a_by_Libranalysis

  • Size

    943KB

  • Sample

    210429-hpehy7bd76

  • MD5

    b7898c6a6ad962f8c6eabacd63d51418

  • SHA1

    d705cbd1a514ad493c5055dc2568a58666cdf73a

  • SHA256

    78e4ef886190359e5dc1f29aa83ed6c99dd06f8f972f740d9884be524b3cd126

  • SHA512

    cf1dd64c43a1c656aadec8c7a96d1dad99554cdb152082da97edcace7e2dbb28a3300178da9aa238bd9e63912921cb8598e8c803ffbec0d65be11ad95d363b73

Malware Config

Targets

    • Target

      b7898c6a_by_Libranalysis

    • Size

      943KB

    • MD5

      b7898c6a6ad962f8c6eabacd63d51418

    • SHA1

      d705cbd1a514ad493c5055dc2568a58666cdf73a

    • SHA256

      78e4ef886190359e5dc1f29aa83ed6c99dd06f8f972f740d9884be524b3cd126

    • SHA512

      cf1dd64c43a1c656aadec8c7a96d1dad99554cdb152082da97edcace7e2dbb28a3300178da9aa238bd9e63912921cb8598e8c803ffbec0d65be11ad95d363b73

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers.

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Quasar Payload

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • UAC bypass

    • Windows security bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

2
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Bypass User Account Control

1
T1088

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

7
T1112

Disabling Security Tools

4
T1089

Bypass User Account Control

1
T1088

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks