General
-
Target
3295138274c034c16522257d6c18f225.exe
-
Size
879KB
-
Sample
220728-hlzcjsdfcj
-
MD5
3295138274c034c16522257d6c18f225
-
SHA1
6f93c0800221d86ec8de5636195383f91cb9a336
-
SHA256
c063f14a72b49e90fe7862e4402540c2227abf2f063c9a8f63af90d4a6ab5e5b
-
SHA512
7fb76b1bd0ec1d7e631c44d9cb82f06c6f2145b9a7797c5c8b18f3752bf18daec6ba57802bd178f630bcb9f9f20fc4486568a92e474d6499366e57f3e5bc81a3
Static task
static1
Behavioral task
behavioral1
Sample
3295138274c034c16522257d6c18f225.exe
Resource
win7-20220718-en
Malware Config
Extracted
quasar
2.1.0.0
Bomboclat
185.236.78.58:4782
VNM_MUTEX_mtYiaCcGzveD5dsvgE
-
encryption_key
1WEWg6889GqBWLC1XKxQ
-
install_name
WndowsSecurityUpdate.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Wndows Dfender Update Startup
-
subdirectory
SubDir
Targets
-
-
Target
3295138274c034c16522257d6c18f225.exe
-
Size
879KB
-
MD5
3295138274c034c16522257d6c18f225
-
SHA1
6f93c0800221d86ec8de5636195383f91cb9a336
-
SHA256
c063f14a72b49e90fe7862e4402540c2227abf2f063c9a8f63af90d4a6ab5e5b
-
SHA512
7fb76b1bd0ec1d7e631c44d9cb82f06c6f2145b9a7797c5c8b18f3752bf18daec6ba57802bd178f630bcb9f9f20fc4486568a92e474d6499366e57f3e5bc81a3
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-