General
-
Target
472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04
-
Size
962KB
-
Sample
220501-3cvcfsahdj
-
MD5
2d8a7a711bf1308a13f02f36ad88bf3b
-
SHA1
df45338383fda3fdc745c9564b76ebd84aaffe19
-
SHA256
472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04
-
SHA512
1cc23482ce5a3ae33713c1aebb6ef503d211512934d12b873ba86d140f9d042dbbd1544aa399b5fefa5a371e24209a21f5994146d7cda9c5ffc63c4b0005b74a
Static task
static1
Behavioral task
behavioral1
Sample
472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04.exe
Resource
win7-20220414-en
Malware Config
Extracted
quasar
2.1.0.0
Office04
codexm0106.ddns.net:1177
VNM_MUTEX_Xnd6D5iIpqWwMJAqx5
-
encryption_key
iN4UZnXEraSZhG0zbaFO
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
2000
-
startup_key
windows startup
-
subdirectory
SubDir
Targets
-
-
Target
472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04
-
Size
962KB
-
MD5
2d8a7a711bf1308a13f02f36ad88bf3b
-
SHA1
df45338383fda3fdc745c9564b76ebd84aaffe19
-
SHA256
472b8091593a2fef317573e75d7bd424ba67b164c0aaaa06c26de6b15d19bb04
-
SHA512
1cc23482ce5a3ae33713c1aebb6ef503d211512934d12b873ba86d140f9d042dbbd1544aa399b5fefa5a371e24209a21f5994146d7cda9c5ffc63c4b0005b74a
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar Payload
-
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-