General
-
Target
b4b4889b0d6ac058b3d39e62c9cb32fea0abb700b92e1e10325e0854470aac50
-
Size
680KB
-
Sample
221130-wd2plabh37
-
MD5
3d9e3bf3109bfe73bccfb57e360fe465
-
SHA1
36bd2e71a35f678c8d1e8066e616706f2dcb8610
-
SHA256
b4b4889b0d6ac058b3d39e62c9cb32fea0abb700b92e1e10325e0854470aac50
-
SHA512
f24992b8f03df563eca83cce818a0d5af04094acde38af3d0acf1ec40ae87272156f56ab72121becbd82f77d296ad39b60939d2282e0167b11dcf3b33db43be7
-
SSDEEP
12288:a5393whFOBbosXQsI6f9fqAPzzEeEZchCBywRiaxJDj8DkIonQmP0Ove/diuHc:a53uhFzsAibzzEe9wRiaLSkI8QhOQ18
Static task
static1
Behavioral task
behavioral1
Sample
b4b4889b0d6ac058b3d39e62c9cb32fea0abb700b92e1e10325e0854470aac50.exe
Resource
win7-20220812-en
Malware Config
Extracted
quasar
2.1.0.0
ajith
23.105.131.178:7812
VNM_MUTEX_NdVd2sPSSqFdo7I35g
-
encryption_key
jyerms3KOWmt3C9DBFuq
-
install_name
Windows Defender Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Update
-
subdirectory
SubDir
Targets
-
-
Target
b4b4889b0d6ac058b3d39e62c9cb32fea0abb700b92e1e10325e0854470aac50
-
Size
680KB
-
MD5
3d9e3bf3109bfe73bccfb57e360fe465
-
SHA1
36bd2e71a35f678c8d1e8066e616706f2dcb8610
-
SHA256
b4b4889b0d6ac058b3d39e62c9cb32fea0abb700b92e1e10325e0854470aac50
-
SHA512
f24992b8f03df563eca83cce818a0d5af04094acde38af3d0acf1ec40ae87272156f56ab72121becbd82f77d296ad39b60939d2282e0167b11dcf3b33db43be7
-
SSDEEP
12288:a5393whFOBbosXQsI6f9fqAPzzEeEZchCBywRiaxJDj8DkIonQmP0Ove/diuHc:a53uhFzsAibzzEe9wRiaLSkI8QhOQ18
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-