General

  • Target

    6342882a032f216c051f670a0ea1fd484e894686f9fd48f18fa10e58b3ba8a92

  • Size

    663KB

  • Sample

    220324-f95s5acga7

  • MD5

    ce171e0a1a242feebb1ea67a852fe6cd

  • SHA1

    25c0ae74d178e052aac7a4f49f26bf1c65e410ce

  • SHA256

    6342882a032f216c051f670a0ea1fd484e894686f9fd48f18fa10e58b3ba8a92

  • SHA512

    8d38df569af8da74c3c6c94fee7449860472d81d100668774cc0e375cecb9972772d90c0e3c8fc1cf929d0cfb5ef0b961c5440aed4be952c0742f74ac78289cb

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

Office04

C2

82.153.167.249:4782

Mutex

VNM_MUTEX_madi8mVzHkv9VeMWQh

Attributes
  • encryption_key

    T2hhcYUj1x3W0YPA9otN

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      6342882a032f216c051f670a0ea1fd484e894686f9fd48f18fa10e58b3ba8a92

    • Size

      663KB

    • MD5

      ce171e0a1a242feebb1ea67a852fe6cd

    • SHA1

      25c0ae74d178e052aac7a4f49f26bf1c65e410ce

    • SHA256

      6342882a032f216c051f670a0ea1fd484e894686f9fd48f18fa10e58b3ba8a92

    • SHA512

      8d38df569af8da74c3c6c94fee7449860472d81d100668774cc0e375cecb9972772d90c0e3c8fc1cf929d0cfb5ef0b961c5440aed4be952c0742f74ac78289cb

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender Real-time Protection settings

    • Quasar Payload

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Turns off Windows Defender SpyNet reporting

    • VenomRAT

      VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

    • Windows security bypass

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Windows security modification

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks