General
-
Target
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c
-
Size
699KB
-
Sample
220417-sc8vqsgfhn
-
MD5
5807ae1cd17e7f9bc109b3df90b243ba
-
SHA1
08595bc28d5f185fce26da9e8362d05ad6eed16d
-
SHA256
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c
-
SHA512
ad790053c056b0bf519c2bae2585c17f063ecc30961936f78092b9684df693d1eb83b15422841172ebb9398a689b4d3f115efb44bbd156739278cca4147482a9
Static task
static1
Behavioral task
behavioral1
Sample
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c.exe
Resource
win7-20220414-en
Malware Config
Extracted
quasar
2.1.0.0
Office04
2.tcp.ngrok.io:12699
VNM_MUTEX_ljpH86m9yQvMdFiQrM
-
encryption_key
u0b02uZLknYm9c6g9jJR
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Security
-
subdirectory
SubDir
Targets
-
-
Target
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c
-
Size
699KB
-
MD5
5807ae1cd17e7f9bc109b3df90b243ba
-
SHA1
08595bc28d5f185fce26da9e8362d05ad6eed16d
-
SHA256
bc263ac14818e3dd2e48cc8954eadd8ec99a9287929f749cda1d5fa55ee4975c
-
SHA512
ad790053c056b0bf519c2bae2585c17f063ecc30961936f78092b9684df693d1eb83b15422841172ebb9398a689b4d3f115efb44bbd156739278cca4147482a9
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar Payload
-
suricata: ET MALWARE W32/Quasar 1.3/Venom RAT Connectivity Check 3
suricata: ET MALWARE W32/Quasar 1.3/Venom RAT Connectivity Check 3
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-