Behavioral task
behavioral1
Sample
ecbe1cbab7710a6b7c33166eeeb192b981047c7fa0989fe6e0e403f79cb1dc86.exe
Resource
win7-20220414-en
General
-
Target
ecbe1cbab7710a6b7c33166eeeb192b981047c7fa0989fe6e0e403f79cb1dc86
-
Size
534KB
-
MD5
45d84deec92077d7fdbd7f56091ed5ef
-
SHA1
f6be7aa7a72ed5c03cf25312833dc19db1c9eb76
-
SHA256
ecbe1cbab7710a6b7c33166eeeb192b981047c7fa0989fe6e0e403f79cb1dc86
-
SHA512
3dc25114f43e73bd6fa8d8a06d41f2eebdfc55adffbfb1e4571f536f82b4677421400986e47883ca5a485aada4b61553a1e8b1b5bbbae1fe667205d3ea8769e8
-
SSDEEP
6144:m8fGDJngzxsoIasFzFMkbN3yEcC+NvbMmSibwbQDIeopf9MlE1f9xGy3V8/GV0jz:AkxfIayFMWZ+bM7E81pf9MlE1f9o7
Malware Config
Extracted
quasar
2.1.0.0
FadedRAT
66.191.218.42:6606
VNM_MUTEX_vy60sMeB6q8c2CPqmk
-
encryption_key
tI07nGR3B89O88FLmj05
-
install_name
zncodec.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
zncodec
-
subdirectory
rrcodex
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
Processes:
resource yara_rule sample disable_win_def -
Quasar Payload 1 IoCs
Processes:
resource yara_rule sample family_quasar -
Quasar family
Files
-
ecbe1cbab7710a6b7c33166eeeb192b981047c7fa0989fe6e0e403f79cb1dc86.exe windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 531KB - Virtual size: 531KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ