General
-
Target
d5f6dbe3d6f5644a77d7a3971d9dd17caec494ced43ffc535473b285b0f1507e
-
Size
1.0MB
-
Sample
230129-v3nzcsha2x
-
MD5
d7ddd317f0382a2200832312449a20cd
-
SHA1
bd3710cff6322c6a372db549b637c32e383f05cc
-
SHA256
d5f6dbe3d6f5644a77d7a3971d9dd17caec494ced43ffc535473b285b0f1507e
-
SHA512
c3936a1943575b0bb9dfdf8fef0d9705fc08c275260ce8199b7ff13213b72173565e7c1a4dfd47bd4a5a592ce10749ff1dafe73ba0053c9bd8f7a8cee495407d
-
SSDEEP
24576:WcvkT1s+3Z3aGWqKg0Ogj1OLHd+JwbMFdt6ATCRcaahwKHGaTKBupdl:hvkTq+3Z3ZWGsSHd+J+MFTsRcXnHGmKm
Static task
static1
Behavioral task
behavioral1
Sample
d5f6dbe3d6f5644a77d7a3971d9dd17caec494ced43ffc535473b285b0f1507e.exe
Resource
win7-20220812-en
Malware Config
Extracted
quasar
2.1.0.0
Office04
127.0.0.1:4782
rat94522.ddnsking.com:4000
VNM_MUTEX_c2q7y2ayYutZ2XaYe7
-
encryption_key
WIwQFd2V7FhUXFH7QX71
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
d5f6dbe3d6f5644a77d7a3971d9dd17caec494ced43ffc535473b285b0f1507e
-
Size
1.0MB
-
MD5
d7ddd317f0382a2200832312449a20cd
-
SHA1
bd3710cff6322c6a372db549b637c32e383f05cc
-
SHA256
d5f6dbe3d6f5644a77d7a3971d9dd17caec494ced43ffc535473b285b0f1507e
-
SHA512
c3936a1943575b0bb9dfdf8fef0d9705fc08c275260ce8199b7ff13213b72173565e7c1a4dfd47bd4a5a592ce10749ff1dafe73ba0053c9bd8f7a8cee495407d
-
SSDEEP
24576:WcvkT1s+3Z3aGWqKg0Ogj1OLHd+JwbMFdt6ATCRcaahwKHGaTKBupdl:hvkTq+3Z3ZWGsSHd+J+MFTsRcXnHGmKm
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-