General
-
Target
14ebd19a3d30828fb90b8a00e9342d4c326888eab4f2794b2c31aa3f23e69ed8
-
Size
1.2MB
-
Sample
210930-jjrelahaep
-
MD5
8db269a5125e5503e09cab3165814770
-
SHA1
9cdd2bef768bec002cba71842e5e5a9373fc3775
-
SHA256
14ebd19a3d30828fb90b8a00e9342d4c326888eab4f2794b2c31aa3f23e69ed8
-
SHA512
ed356b5ea783c41e3837809e80a19e0a9fa4b7f581ebbef224c1ed3541f3a8240b38bfd727145a81a02a32ac4efa39fa92c736cf889d4cd5ac26578bb85cdc0f
Static task
static1
Behavioral task
behavioral1
Sample
14ebd19a3d30828fb90b8a00e9342d4c326888eab4f2794b2c31aa3f23e69ed8.exe
Resource
win7-en-20210920
Malware Config
Extracted
quasar
2.1.0.0
Office04
grace.adds-only.xyz:1609
VNM_MUTEX_c2q7y2ayYutZ2XaYe7
-
encryption_key
wHq4o3k6UfKZv19jkcxs
-
install_name
winrara.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
14ebd19a3d30828fb90b8a00e9342d4c326888eab4f2794b2c31aa3f23e69ed8
-
Size
1.2MB
-
MD5
8db269a5125e5503e09cab3165814770
-
SHA1
9cdd2bef768bec002cba71842e5e5a9373fc3775
-
SHA256
14ebd19a3d30828fb90b8a00e9342d4c326888eab4f2794b2c31aa3f23e69ed8
-
SHA512
ed356b5ea783c41e3837809e80a19e0a9fa4b7f581ebbef224c1ed3541f3a8240b38bfd727145a81a02a32ac4efa39fa92c736cf889d4cd5ac26578bb85cdc0f
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-