General
-
Target
bb93cc9ac1cab079b9d6de25f206129f.exe
-
Size
141KB
-
Sample
230114-akggcabb9w
-
MD5
bb93cc9ac1cab079b9d6de25f206129f
-
SHA1
ba3a22a55f312eae953e10a352399a2950db42a2
-
SHA256
9ff2439dd5f32e84e058c6ffe6864efefee16651600726b85a4cac2d2c0e4cdf
-
SHA512
34eaa395573d6ae9c7ebb8b192b08549e49a0eb4da47ca280a5ece763fb927f60dba669b8adf7ab3a45a8a21eb438851ec484523b948bb6718a963ee08de92b7
-
SSDEEP
3072:RARHROub6IiZktM+t4B6IZeAzaZyJ6QYzHHxgGT0Iw:RkxbQktMo4BRiyjYz6GTrw
Static task
static1
Behavioral task
behavioral1
Sample
bb93cc9ac1cab079b9d6de25f206129f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bb93cc9ac1cab079b9d6de25f206129f.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
quasar
2.1.0.0
Office01
172.81.131.113:4782
VNM_MUTEX_OFUOtYdHQP7Y7fAk1P
-
encryption_key
xufMEowCMSpdPlEx87tq
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
mvscs
-
subdirectory
SubDir
Targets
-
-
Target
bb93cc9ac1cab079b9d6de25f206129f.exe
-
Size
141KB
-
MD5
bb93cc9ac1cab079b9d6de25f206129f
-
SHA1
ba3a22a55f312eae953e10a352399a2950db42a2
-
SHA256
9ff2439dd5f32e84e058c6ffe6864efefee16651600726b85a4cac2d2c0e4cdf
-
SHA512
34eaa395573d6ae9c7ebb8b192b08549e49a0eb4da47ca280a5ece763fb927f60dba669b8adf7ab3a45a8a21eb438851ec484523b948bb6718a963ee08de92b7
-
SSDEEP
3072:RARHROub6IiZktM+t4B6IZeAzaZyJ6QYzHHxgGT0Iw:RkxbQktMo4BRiyjYz6GTrw
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar payload
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-