General
-
Target
e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05
-
Size
814KB
-
Sample
210908-k3cafsebf3
-
MD5
303ea82c0a37e377879a61a6d403ab48
-
SHA1
f3f542e801ae5a7689864d974e1b4776468acbe2
-
SHA256
e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05
-
SHA512
d280e0e59a51135a78cf7699c89317768f8a045441a20990ab286a48be9e20c93ef1eea85f18d9517654f28218c960d21f2ececbe0baa3c8a2790e1304c7c279
Behavioral task
behavioral1
Sample
e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05.exe
Resource
win7-en
Malware Config
Extracted
quasar
2.1.0.0
Client
spicy-scissors.auto.playit.gg:40602
VNM_MUTEX_ZPezzH7q77HhYvgQHf
-
encryption_key
qDSGWka1LfDTYuj2fN6F
-
install_name
GNU.exe
-
log_directory
Logs
-
reconnect_delay
2500
-
startup_key
Windows Security
-
subdirectory
Ubuntu
Targets
-
-
Target
e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05
-
Size
814KB
-
MD5
303ea82c0a37e377879a61a6d403ab48
-
SHA1
f3f542e801ae5a7689864d974e1b4776468acbe2
-
SHA256
e9235af1531343351a94508e6795d9fdc05bb06b334e8368dc39f0fe12c46f05
-
SHA512
d280e0e59a51135a78cf7699c89317768f8a045441a20990ab286a48be9e20c93ef1eea85f18d9517654f28218c960d21f2ececbe0baa3c8a2790e1304c7c279
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-