General
-
Target
8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e
-
Size
783KB
-
Sample
220320-cyv8rsfcam
-
MD5
d677b73dcb14c399d5c986a6558356df
-
SHA1
7b52f0235c834943078af0292636b335cd86e103
-
SHA256
8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e
-
SHA512
e00f0116fa1297dcf20b55c85c521af3cd8b66daa629ba475fd01173ceb1df66cf6c1ae1f2807b8c098d560afa073f23a84260b980c93df3ed173d4d81271126
Static task
static1
Behavioral task
behavioral1
Sample
8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e.exe
Resource
win7-20220310-en
Malware Config
Extracted
quasar
2.1.0.0
Office04
193.161.193.99:29069
VNM_MUTEX_04STdugX9pbf1yeEFR
-
encryption_key
gOa6B7rJfhbU1IIsLE4i
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows LoginUI
-
subdirectory
SubDir
Targets
-
-
Target
8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e
-
Size
783KB
-
MD5
d677b73dcb14c399d5c986a6558356df
-
SHA1
7b52f0235c834943078af0292636b335cd86e103
-
SHA256
8bbc3dd05bc944d2b9dc013280c472067e01625ca0b7af94aa0895bb7e4f964e
-
SHA512
e00f0116fa1297dcf20b55c85c521af3cd8b66daa629ba475fd01173ceb1df66cf6c1ae1f2807b8c098d560afa073f23a84260b980c93df3ed173d4d81271126
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar Payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-