General
-
Target
EaseUS Partition Master v15.5 (All Editions) + Fix\Setup\epm_setup.exe
-
Size
45.4MB
-
Sample
211221-qknhnaedbp
-
MD5
362b463dbc385956a53038ce51a216d7
-
SHA1
7c675879edbdad5abaf98c43867dbb734d2eab31
-
SHA256
f6eefa2b51e3cac7c28e1f1daee27e58da32f1d185444ca091ab74054f7324d9
-
SHA512
1a6e436bf1da58ed66b69e0aadb03eab0a84424e14a057e5eb3d2efb210a26347c8f93c2d6c96e204a99ce3a316d564bfb9a0a6c725f19240e89beefa447cd44
Static task
static1
Behavioral task
behavioral1
Sample
EaseUS Partition Master v15.5 (All Editions) + Fix\Setup\epm_setup.exe
Resource
win7-en-20211208
Malware Config
Targets
-
-
Target
EaseUS Partition Master v15.5 (All Editions) + Fix\Setup\epm_setup.exe
-
Size
45.4MB
-
MD5
362b463dbc385956a53038ce51a216d7
-
SHA1
7c675879edbdad5abaf98c43867dbb734d2eab31
-
SHA256
f6eefa2b51e3cac7c28e1f1daee27e58da32f1d185444ca091ab74054f7324d9
-
SHA512
1a6e436bf1da58ed66b69e0aadb03eab0a84424e14a057e5eb3d2efb210a26347c8f93c2d6c96e204a99ce3a316d564bfb9a0a6c725f19240e89beefa447cd44
-
Quasar Payload
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
suricata: ET MALWARE Observed Malicious SSL Cert (Quasar CnC)
suricata: ET MALWARE Observed Malicious SSL Cert (Quasar CnC)
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-