General
-
Target
bby.exe
-
Size
16.0MB
-
Sample
220805-lll9rshgh8
-
MD5
d7e48e5a49efe9ed774546fa7d35d71a
-
SHA1
06212065ffe07d1321c8d85bf5c45871683fb197
-
SHA256
b4f6e6290b1e185bff0baf1b1f3a16291bb2ceb3528051a2aa9528c43231e710
-
SHA512
7dcfc267f527d27d6cb58bd950241b4a8a658b34bc4696f308fd5448b4111d64b93078fedf8d2c138eef83b6148372d8c887b74aae8291fc05c665fbe3d4eeb1
Static task
static1
Behavioral task
behavioral1
Sample
bby.exe
Resource
win7-20220718-en
Malware Config
Extracted
quasar
2.1.0.0
Office04
cable-cp.at.playit.gg:21596
VNM_MUTEX_c2q7y2ayYutZ2XaYe7
-
encryption_key
GDDG0qqm5dHuoT6GjWWz
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft one Drive
-
subdirectory
SubDir
Targets
-
-
Target
bby.exe
-
Size
16.0MB
-
MD5
d7e48e5a49efe9ed774546fa7d35d71a
-
SHA1
06212065ffe07d1321c8d85bf5c45871683fb197
-
SHA256
b4f6e6290b1e185bff0baf1b1f3a16291bb2ceb3528051a2aa9528c43231e710
-
SHA512
7dcfc267f527d27d6cb58bd950241b4a8a658b34bc4696f308fd5448b4111d64b93078fedf8d2c138eef83b6148372d8c887b74aae8291fc05c665fbe3d4eeb1
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
2Install Root Certificate
1Modify Registry
4