General
-
Target
78973c8f956a77c6c88aa4b508ce289d2c59966e1e7f2af4fc9cfd9e2368df66.zip
-
Size
12.3MB
-
Sample
230321-rz1xzadc8s
-
MD5
cf4432a361e609f331ae214a4c7712bb
-
SHA1
ec64a4b815c26c08743be395b797507722246ccb
-
SHA256
50e243b9f1481a581e8e8c2a5101f3ef43253adb873bb7c6ca4eb1ce3c7e9d61
-
SHA512
f5748f15b6b9e98b92fc58a9f3ec5e336777b863cc3de49bec3dce4dcb66c18a4a0e7de28c3abe663be62417ac3262265ab67e8c8c9493c5ebfee00d101a2176
-
SSDEEP
196608:jckxANxAtW8oV4DW8/QjGjzCHElOhL8SLdRy8EJwiPxS2bwtoyxH7X7oMNXP37Tj:9xkutmMW8/b/OL8MrLN8f837oMNXPTn
Static task
static1
Behavioral task
behavioral1
Sample
78973c8f956a77c6c88aa4b508ce289d2c59966e1e7f2af4fc9cfd9e2368df66.exe
Resource
win7-20230220-en
Malware Config
Extracted
quasar
1.4.0.0
storage
xmarvel.ddns.net:4782
2.58.56.188:4782
Slbw7KtgA7WecQEqcR
-
encryption_key
BTg0dEybEXwn6MM90CP2
-
install_name
ccleaner.exe
-
log_directory
windowfirewalls
-
reconnect_delay
1
-
startup_key
windowsfirewall.msc
-
subdirectory
windowsfirewall
Extracted
limerat
13WHQ6XEobZYNAjHZPJHkDuzMS8TpgkRqm
-
aes_key
key
-
antivm
true
-
c2_url
https://pastebin.com/raw/nW4J6TiP
-
delay
3
-
download_payload
false
-
install
true
-
install_name
windowsdefender.exe
-
main_folder
AppData
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Extracted
quasar
-
reconnect_delay
1
Targets
-
-
Target
78973c8f956a77c6c88aa4b508ce289d2c59966e1e7f2af4fc9cfd9e2368df66.exe
-
Size
12.9MB
-
MD5
a364b35d4dbdcf328367df843a6286c1
-
SHA1
31a54c5118109afa7d5c7c465bb4d3b25c947284
-
SHA256
78973c8f956a77c6c88aa4b508ce289d2c59966e1e7f2af4fc9cfd9e2368df66
-
SHA512
e0687836489ea4cf25fb2b58105a46666a46a447acd01e291a5646928a12e469031f2936087cded0e7eee869cb6e71784c588cd61812387073ba4d0b637c6826
-
SSDEEP
196608:Lg+Aalc1yGZIh6L5iYl/dsy+7d3tFELLs1cAm6f971YAmX1ZK1vauo9Dn:Lgsl5hef1k7ptmQbm6fnmlZsoRn
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-