General
-
Target
d959ff47bfc45b45bf58c3dc5fc72d0112093950916a0f5c05eafdaffe123726
-
Size
664KB
-
Sample
220503-yw7dxaecbj
-
MD5
1f2f26a299287d8353502a9133df4cf1
-
SHA1
ee40f71067f91d23841e2f2f2b178a153e0f4e07
-
SHA256
d959ff47bfc45b45bf58c3dc5fc72d0112093950916a0f5c05eafdaffe123726
-
SHA512
135124918b26b6dffecf39953eacfaef9ab1e715423a1c1db6ca87fb79c2c38e7b068dcfc01cb70ecaf56af2f6f2b5a270b1e2eb0fcc9d3f4b48ae1a00846c97
Static task
static1
Behavioral task
behavioral1
Sample
d959ff47bfc45b45bf58c3dc5fc72d0112093950916a0f5c05eafdaffe123726.exe
Resource
win7-20220414-en
Malware Config
Extracted
quasar
2.1.0.0
Office04
127.0.0.1:4782
karmina113.sytes.net:2222
karmina200.sytes.net:2222
VNM_MUTEX_c2q7y2ayYutZ2XaYe7
-
encryption_key
Utv1d8B5zhHYcWfy3OEQ
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Targets
-
-
Target
d959ff47bfc45b45bf58c3dc5fc72d0112093950916a0f5c05eafdaffe123726
-
Size
664KB
-
MD5
1f2f26a299287d8353502a9133df4cf1
-
SHA1
ee40f71067f91d23841e2f2f2b178a153e0f4e07
-
SHA256
d959ff47bfc45b45bf58c3dc5fc72d0112093950916a0f5c05eafdaffe123726
-
SHA512
135124918b26b6dffecf39953eacfaef9ab1e715423a1c1db6ca87fb79c2c38e7b068dcfc01cb70ecaf56af2f6f2b5a270b1e2eb0fcc9d3f4b48ae1a00846c97
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar Payload
-
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-