General
-
Target
f700dbb00b021ec7aae45730deae300139cc3e644d6375d7d9d2a6d2330bb0d6
-
Size
11.3MB
-
Sample
230129-z8r1esdc69
-
MD5
73227127a3d640f47ee9155ca93376ea
-
SHA1
2bdec123a95cee29753f4f8262d1c8aee4373b54
-
SHA256
f700dbb00b021ec7aae45730deae300139cc3e644d6375d7d9d2a6d2330bb0d6
-
SHA512
513fb2743cd508be198edb932341608bc5177aa9153fe5d37f7450c2dfe060b4417d4dd4e72c80bad6c7ff6ee56652a2e353271de7b5ae2278af4fa5361167cc
-
SSDEEP
196608:08U2MU8vvO95NZVDmCvsjtXje8rJFrF49/zMMnJ1WkGAEGVPMDPjcHdB6UE14:0z2F8gnVCze8nrmhJ4kGAEjPj+dBo14
Static task
static1
Behavioral task
behavioral1
Sample
f700dbb00b021ec7aae45730deae300139cc3e644d6375d7d9d2a6d2330bb0d6.exe
Resource
win7-20220812-en
Malware Config
Extracted
quasar
2.1.0.0
Jarmoir
extra-large-step.auto.playit.gg:41705
VNM_MUTEX_C21ZcJOFvO32vviyP0
-
encryption_key
itjIdJFadVQmRz5fsUXr
-
install_name
$77boniarz.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Update
-
subdirectory
System32
Targets
-
-
Target
f700dbb00b021ec7aae45730deae300139cc3e644d6375d7d9d2a6d2330bb0d6
-
Size
11.3MB
-
MD5
73227127a3d640f47ee9155ca93376ea
-
SHA1
2bdec123a95cee29753f4f8262d1c8aee4373b54
-
SHA256
f700dbb00b021ec7aae45730deae300139cc3e644d6375d7d9d2a6d2330bb0d6
-
SHA512
513fb2743cd508be198edb932341608bc5177aa9153fe5d37f7450c2dfe060b4417d4dd4e72c80bad6c7ff6ee56652a2e353271de7b5ae2278af4fa5361167cc
-
SSDEEP
196608:08U2MU8vvO95NZVDmCvsjtXje8rJFrF49/zMMnJ1WkGAEGVPMDPjcHdB6UE14:0z2F8gnVCze8nrmhJ4kGAEjPj+dBo14
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-