General
-
Target
ecbe1cbab7710a6b7c33166eeeb192b981047c7fa0989fe6e0e403f79cb1dc86
-
Size
534KB
-
Sample
220520-frvv7sdhdj
-
MD5
45d84deec92077d7fdbd7f56091ed5ef
-
SHA1
f6be7aa7a72ed5c03cf25312833dc19db1c9eb76
-
SHA256
ecbe1cbab7710a6b7c33166eeeb192b981047c7fa0989fe6e0e403f79cb1dc86
-
SHA512
3dc25114f43e73bd6fa8d8a06d41f2eebdfc55adffbfb1e4571f536f82b4677421400986e47883ca5a485aada4b61553a1e8b1b5bbbae1fe667205d3ea8769e8
Behavioral task
behavioral1
Sample
ecbe1cbab7710a6b7c33166eeeb192b981047c7fa0989fe6e0e403f79cb1dc86.exe
Resource
win7-20220414-en
Malware Config
Extracted
quasar
2.1.0.0
FadedRAT
66.191.218.42:6606
VNM_MUTEX_vy60sMeB6q8c2CPqmk
-
encryption_key
tI07nGR3B89O88FLmj05
-
install_name
zncodec.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
zncodec
-
subdirectory
rrcodex
Targets
-
-
Target
ecbe1cbab7710a6b7c33166eeeb192b981047c7fa0989fe6e0e403f79cb1dc86
-
Size
534KB
-
MD5
45d84deec92077d7fdbd7f56091ed5ef
-
SHA1
f6be7aa7a72ed5c03cf25312833dc19db1c9eb76
-
SHA256
ecbe1cbab7710a6b7c33166eeeb192b981047c7fa0989fe6e0e403f79cb1dc86
-
SHA512
3dc25114f43e73bd6fa8d8a06d41f2eebdfc55adffbfb1e4571f536f82b4677421400986e47883ca5a485aada4b61553a1e8b1b5bbbae1fe667205d3ea8769e8
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar Payload
-
suricata: ET MALWARE Common RAT Connectivity Check Observed
suricata: ET MALWARE Common RAT Connectivity Check Observed
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-