General
-
Target
34e12b6ed242c02d15dca535ad869485e2ac55491e46181ce08ede26957bd94e
-
Size
1.2MB
-
Sample
220414-qvphpsaghk
-
MD5
a7850e7c98d51d8143fac5ea73a8b7c1
-
SHA1
d983449e7e47fd7abd80ebcd7e00941bcfe59c50
-
SHA256
34e12b6ed242c02d15dca535ad869485e2ac55491e46181ce08ede26957bd94e
-
SHA512
a8c91d8f41e57cb3e6e5247a17a4e9e103d64f7b53a4e2b8da7e9d1ee7c4578f9c191fd25a9f422d175034e59492535ee8d19045a1ac2ec836959527d23c48b9
Static task
static1
Behavioral task
behavioral1
Sample
34e12b6ed242c02d15dca535ad869485e2ac55491e46181ce08ede26957bd94e.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
34e12b6ed242c02d15dca535ad869485e2ac55491e46181ce08ede26957bd94e.exe
Resource
win10v2004-20220331-en
Malware Config
Extracted
quasar
2.1.0.0
shooter00hrs
185.219.134.245:4782
VNM_MUTEX_ZFDh9LaTbTmwqFwo3L
-
encryption_key
wGYjrQIx5abERLvzC8Zu
-
install_name
windows chrome.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
chrome Startup
-
subdirectory
SubDir
Extracted
warzonerat
185.219.134.245:5200
Targets
-
-
Target
34e12b6ed242c02d15dca535ad869485e2ac55491e46181ce08ede26957bd94e
-
Size
1.2MB
-
MD5
a7850e7c98d51d8143fac5ea73a8b7c1
-
SHA1
d983449e7e47fd7abd80ebcd7e00941bcfe59c50
-
SHA256
34e12b6ed242c02d15dca535ad869485e2ac55491e46181ce08ede26957bd94e
-
SHA512
a8c91d8f41e57cb3e6e5247a17a4e9e103d64f7b53a4e2b8da7e9d1ee7c4578f9c191fd25a9f422d175034e59492535ee8d19045a1ac2ec836959527d23c48b9
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar Payload
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
suricata: ET MALWARE W32/Quasar 1.3/Venom RAT Connectivity Check 3
suricata: ET MALWARE W32/Quasar 1.3/Venom RAT Connectivity Check 3
-
Warzone RAT Payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-