General
-
Target
5e43890d2a5f7ccb9728e2eec8a030131c94be13d6358a85835806306ad44952
-
Size
716KB
-
Sample
220418-nzf11shdf5
-
MD5
57a24eb9bd6fcda2c033c8ca10890e09
-
SHA1
35a011428d3a4020658c294e35527c4205ede798
-
SHA256
5e43890d2a5f7ccb9728e2eec8a030131c94be13d6358a85835806306ad44952
-
SHA512
4bdca657fb1faf8bc9ea9459bb022837792483abb87d3bf257609a31e91b5f59af1fa672d588f567779f3b113c1b04a6ef1f81f6ff7c9779a6b4eb917c02e67c
Static task
static1
Behavioral task
behavioral1
Sample
5e43890d2a5f7ccb9728e2eec8a030131c94be13d6358a85835806306ad44952.exe
Resource
win7-20220414-en
Malware Config
Extracted
quasar
2.1.0.0
Mundo
201.111.223.252:6700
VNM_MUTEX_KJflzK0oXUK0jjdJ05
-
encryption_key
eSgMT4XlUNEBcxqW7GsH
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
5e43890d2a5f7ccb9728e2eec8a030131c94be13d6358a85835806306ad44952
-
Size
716KB
-
MD5
57a24eb9bd6fcda2c033c8ca10890e09
-
SHA1
35a011428d3a4020658c294e35527c4205ede798
-
SHA256
5e43890d2a5f7ccb9728e2eec8a030131c94be13d6358a85835806306ad44952
-
SHA512
4bdca657fb1faf8bc9ea9459bb022837792483abb87d3bf257609a31e91b5f59af1fa672d588f567779f3b113c1b04a6ef1f81f6ff7c9779a6b4eb917c02e67c
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar Payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-