General
-
Target
66e8a14e6da21c74e44afd4ec991f7545c8d256490e3abc9fa4a982ba3ed3c4c
-
Size
832KB
-
Sample
211019-dbdwmsgagl
-
MD5
55ecab29639d0374ead2ddfdb6c0ee74
-
SHA1
04d18d6e21ee46a3d25fc0d8c99af7719de106c5
-
SHA256
66e8a14e6da21c74e44afd4ec991f7545c8d256490e3abc9fa4a982ba3ed3c4c
-
SHA512
639addccae1ca291625368581c16dfba6918ca1e8922ba59bb1721eef1cb0b29e06fb36e25e10ef2c58d372d30c3620a5eb9da56760d9a35831a0074f9416ff1
Static task
static1
Malware Config
Extracted
quasar
2.1.0.0
Office04
grace.adds-only.xyz:1609
VNM_MUTEX_c2q7y2ayYutZ2XaYe7
-
encryption_key
wHq4o3k6UfKZv19jkcxs
-
install_name
winrara.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
66e8a14e6da21c74e44afd4ec991f7545c8d256490e3abc9fa4a982ba3ed3c4c
-
Size
832KB
-
MD5
55ecab29639d0374ead2ddfdb6c0ee74
-
SHA1
04d18d6e21ee46a3d25fc0d8c99af7719de106c5
-
SHA256
66e8a14e6da21c74e44afd4ec991f7545c8d256490e3abc9fa4a982ba3ed3c4c
-
SHA512
639addccae1ca291625368581c16dfba6918ca1e8922ba59bb1721eef1cb0b29e06fb36e25e10ef2c58d372d30c3620a5eb9da56760d9a35831a0074f9416ff1
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar Payload
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-