General
-
Target
a364b35d4dbdcf328367df843a6286c1.bin
-
Size
12.3MB
-
Sample
230306-b1r4fshf6x
-
MD5
303493f1a6f9ad2e3cf524a182414a63
-
SHA1
eca170bcc80856f5be4550b40d43f045a7ce901e
-
SHA256
9fd04a33577137b35d9fbe5ac37b8bc59fe107a259fc9430c2492afeaab80842
-
SHA512
a4f4c567bff065fa30e1cbdfc929d31f464bd5d997a3c6a41d6a25d6bfc17203128976b59b2275652dda2e9b76e4753c37cdd44c5a4014e3b390949285b3edcc
-
SSDEEP
196608:3tktDAzvM8n8DAAUFo9Tfv9T2GwxZFb37EH3XNV9AXUj6HQaTKSSMQ1ydSdK:W10n8EvKTH0Ge2XN4xQxv11OSs
Static task
static1
Behavioral task
behavioral1
Sample
78973c8f956a77c6c88aa4b508ce289d2c59966e1e7f2af4fc9cfd9e2368df66.exe
Resource
win7-20230220-en
Malware Config
Extracted
quasar
1.4.0.0
storage
xmarvel.ddns.net:4782
2.58.56.188:4782
Slbw7KtgA7WecQEqcR
-
encryption_key
BTg0dEybEXwn6MM90CP2
-
install_name
ccleaner.exe
-
log_directory
windowfirewalls
-
reconnect_delay
1
-
startup_key
windowsfirewall.msc
-
subdirectory
windowsfirewall
Extracted
limerat
13WHQ6XEobZYNAjHZPJHkDuzMS8TpgkRqm
-
aes_key
key
-
antivm
true
-
c2_url
https://pastebin.com/raw/nW4J6TiP
-
delay
3
-
download_payload
false
-
install
true
-
install_name
windowsdefender.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Extracted
quasar
-
reconnect_delay
1
Targets
-
-
Target
78973c8f956a77c6c88aa4b508ce289d2c59966e1e7f2af4fc9cfd9e2368df66.exe
-
Size
12.9MB
-
MD5
a364b35d4dbdcf328367df843a6286c1
-
SHA1
31a54c5118109afa7d5c7c465bb4d3b25c947284
-
SHA256
78973c8f956a77c6c88aa4b508ce289d2c59966e1e7f2af4fc9cfd9e2368df66
-
SHA512
e0687836489ea4cf25fb2b58105a46666a46a447acd01e291a5646928a12e469031f2936087cded0e7eee869cb6e71784c588cd61812387073ba4d0b637c6826
-
SSDEEP
196608:Lg+Aalc1yGZIh6L5iYl/dsy+7d3tFELLs1cAm6f971YAmX1ZK1vauo9Dn:Lgsl5hef1k7ptmQbm6fnmlZsoRn
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-