General
-
Target
f1946c208e4a8f7428f97e8e40f31ffa95885b61571dc4ab9ba6a3356336fc12
-
Size
12.8MB
-
Sample
221130-v3arqsah45
-
MD5
1c1cd3ee6e73a4e599c7c32bae300b05
-
SHA1
dd22b9c9531efdecd80d37b01254e96728ef26c3
-
SHA256
f1946c208e4a8f7428f97e8e40f31ffa95885b61571dc4ab9ba6a3356336fc12
-
SHA512
484ab45694f4789a8f385dd6346c2711d8b79368760819065592163f763a8724c91993fbc0bfbf58ce0c1d0f7d9132f9b59a99645790e4e68ece6650b99cd037
-
SSDEEP
393216:IY/d0T2My8oDotr3LItcM4epPOgmYQbml1ay:IYeqvE1Sd/WmSy
Static task
static1
Behavioral task
behavioral1
Sample
f1946c208e4a8f7428f97e8e40f31ffa95885b61571dc4ab9ba6a3356336fc12.exe
Resource
win7-20220812-en
Malware Config
Extracted
quasar
2.1.0.0
greedens
127.0.0.1:4782
VNM_MUTEX_7DOOh0yZCLxX4Y4Ltu
-
encryption_key
ZSBFYPSY9jJS688RgNV6
-
install_name
$77setup.exe
-
log_directory
gameboard
-
reconnect_delay
3000
-
startup_key
drivers
-
subdirectory
$77
Targets
-
-
Target
f1946c208e4a8f7428f97e8e40f31ffa95885b61571dc4ab9ba6a3356336fc12
-
Size
12.8MB
-
MD5
1c1cd3ee6e73a4e599c7c32bae300b05
-
SHA1
dd22b9c9531efdecd80d37b01254e96728ef26c3
-
SHA256
f1946c208e4a8f7428f97e8e40f31ffa95885b61571dc4ab9ba6a3356336fc12
-
SHA512
484ab45694f4789a8f385dd6346c2711d8b79368760819065592163f763a8724c91993fbc0bfbf58ce0c1d0f7d9132f9b59a99645790e4e68ece6650b99cd037
-
SSDEEP
393216:IY/d0T2My8oDotr3LItcM4epPOgmYQbml1ay:IYeqvE1Sd/WmSy
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Executes dropped EXE
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
2Install Root Certificate
1Modify Registry
4Virtualization/Sandbox Evasion
1