General
-
Target
4113f5b8526a18afb979ae9d4649c7e01abdf2c311608be8cd131a301298ea20
-
Size
754KB
-
Sample
221125-k2yr3aaf5w
-
MD5
7458e53900eacc8d1c0738a242bf3d8b
-
SHA1
c7665e28afc4b44882916d4abf8acf17abf5ce59
-
SHA256
4113f5b8526a18afb979ae9d4649c7e01abdf2c311608be8cd131a301298ea20
-
SHA512
7c8872c2769466762131464780e8982e8f9da652b2524bf13f0c7c8044f61ed54b0df1869ed1f62d6413c0b321176c327daa33d6a15144ab0e5b549c5fd93da2
-
SSDEEP
12288:C9cxy4jZZ8vDc6h3iUhFbAsUMdzxP0V2t5fI44FPTZFyd4:C9cxy4jZ+vDc05hFXxxEIfhe7yd4
Static task
static1
Behavioral task
behavioral1
Sample
4113f5b8526a18afb979ae9d4649c7e01abdf2c311608be8cd131a301298ea20.exe
Resource
win7-20221111-en
Malware Config
Extracted
quasar
2.1.0.0
hacked
23.105.131.178:7812
VNM_MUTEX_0Ae9WwC7TPO9smz3BJ
-
encryption_key
jCEkwlvO5Scyan0S8vZo
-
install_name
Windows Security Health Service.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Update
-
subdirectory
Microsoft
Targets
-
-
Target
4113f5b8526a18afb979ae9d4649c7e01abdf2c311608be8cd131a301298ea20
-
Size
754KB
-
MD5
7458e53900eacc8d1c0738a242bf3d8b
-
SHA1
c7665e28afc4b44882916d4abf8acf17abf5ce59
-
SHA256
4113f5b8526a18afb979ae9d4649c7e01abdf2c311608be8cd131a301298ea20
-
SHA512
7c8872c2769466762131464780e8982e8f9da652b2524bf13f0c7c8044f61ed54b0df1869ed1f62d6413c0b321176c327daa33d6a15144ab0e5b549c5fd93da2
-
SSDEEP
12288:C9cxy4jZZ8vDc6h3iUhFbAsUMdzxP0V2t5fI44FPTZFyd4:C9cxy4jZ+vDc05hFXxxEIfhe7yd4
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-