General
-
Target
a1ad019a246135df45b5a99c2bc3ae67799629d6badacb508536dccff3059f79
-
Size
288KB
-
Sample
220912-g6fkhagdhp
-
MD5
ce29be61700fab69db5ab7d660a07794
-
SHA1
ed402bdcaa0f4c72a7552462c14479319ad4cc68
-
SHA256
a1ad019a246135df45b5a99c2bc3ae67799629d6badacb508536dccff3059f79
-
SHA512
56a885b829bb95d4cf3f3623707f72c266054e3fd85d48f7317c8ad4e526f53185a55dc9ad1e2c7bce1c26f11da23bbfb913658281d44e5905a641fac6eae81e
-
SSDEEP
6144:xWb83o71aKdG9Xj/nlOHn9ZXd/jwGTxzmWQPuTmS:x7u1avdj/nlOHn/d/MibQPh
Static task
static1
Behavioral task
behavioral1
Sample
a1ad019a246135df45b5a99c2bc3ae67799629d6badacb508536dccff3059f79.exe
Resource
win10-20220901-en
Malware Config
Extracted
http://microsoftdownload.ddns.net:8808/downloader/WinSecurityUpdate
Extracted
icexloader
http://microsoftdownload.ddns.net:8808/Server/Script.php
Extracted
quasar
2.7.0.0
2CCA
thisisfakeih2d.ddns.net:4545
GXLGIiyQp5wWhAjcFv
-
encryption_key
JsEHaZbfJjURZfPkp9qk
-
install_name
face.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Client
Targets
-
-
Target
a1ad019a246135df45b5a99c2bc3ae67799629d6badacb508536dccff3059f79
-
Size
288KB
-
MD5
ce29be61700fab69db5ab7d660a07794
-
SHA1
ed402bdcaa0f4c72a7552462c14479319ad4cc68
-
SHA256
a1ad019a246135df45b5a99c2bc3ae67799629d6badacb508536dccff3059f79
-
SHA512
56a885b829bb95d4cf3f3623707f72c266054e3fd85d48f7317c8ad4e526f53185a55dc9ad1e2c7bce1c26f11da23bbfb913658281d44e5905a641fac6eae81e
-
SSDEEP
6144:xWb83o71aKdG9Xj/nlOHn9ZXd/jwGTxzmWQPuTmS:x7u1avdj/nlOHn/d/MibQPh
-
Detects IceXLoader v3.0
-
Detects Smokeloader packer
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Quasar payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-