General
-
Target
a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c
-
Size
629KB
-
Sample
220508-wlcqfaecc2
-
MD5
4df6edc58b2aee8108bbf41a5281a0b3
-
SHA1
372c881c85e6dd404ff65a086b0c7dd8e300ec19
-
SHA256
a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c
-
SHA512
3787c1833a05a31e1aa9a92e5b2dc081911ca98a490bd78c978d20d3d6ff5c4ab9081e6f0d4fe31e190bc454a73ddd641391969e310ecfa65f79963f2e3e2455
Static task
static1
Malware Config
Extracted
quasar
2.1.0.0
Windows Defender Security Host
vilvaraj-32652.portmap.io:32652
VNM_MUTEX_s1ArJSYbui8dt0HUpJ
-
encryption_key
8gl4TCjsLQUmqCIxalku
-
install_name
Windows Defender Security Host.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Defender Security Host
-
subdirectory
SubDir
Targets
-
-
Target
a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c
-
Size
629KB
-
MD5
4df6edc58b2aee8108bbf41a5281a0b3
-
SHA1
372c881c85e6dd404ff65a086b0c7dd8e300ec19
-
SHA256
a640fa0ec1f3da74886079154feb39fcdc8f03b850ab8ae47c35602e4df29d8c
-
SHA512
3787c1833a05a31e1aa9a92e5b2dc081911ca98a490bd78c978d20d3d6ff5c4ab9081e6f0d4fe31e190bc454a73ddd641391969e310ecfa65f79963f2e3e2455
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar Payload
-
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-