Behavioral task
behavioral1
Sample
_-Venom.exe
Resource
win7-20220223-en
General
-
Target
_-Venom.exe
-
Size
534KB
-
MD5
56b18f02883a486cbb4c826028ecfe11
-
SHA1
3e9a496bc38f73910cbd3d5576ec22d9b804a8dd
-
SHA256
815b2bf1ddadfb46a27001e08246e8f82f629eb793963bef856d17e1ef9c4085
-
SHA512
b507414c3d429d0d38dfffe2a5a3ec174012087790dd6c9ce86d16c402e68cc15788a1ec7c6baa8a3fc6f71c8a5695ef155288abc216660f9d5c54df5a75ad35
Malware Config
Extracted
quasar
2.1.0.0
HOST _S
44334333-31579.portmap.io:31579
VNM_MUTEX_yC484ajmODj5OJv3Dx
-
encryption_key
psSc86jtY2yoNlEhs1Dp
-
install_name
svchost.exe
-
log_directory
liblogsconfig
-
reconnect_delay
3000
-
startup_key
Java Update jdk
-
subdirectory
svchost
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule sample disable_win_def -
Quasar Payload 1 IoCs
resource yara_rule sample family_quasar -
Quasar family
Files
-
_-Venom.exe.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 531KB - Virtual size: 531KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ