General
-
Target
380cd105672b970a3783c0036ebaf09d
-
Size
1.0MB
-
Sample
231222-awbp8sabh9
-
MD5
380cd105672b970a3783c0036ebaf09d
-
SHA1
112ee91c03921b1aaa3ca9b901054a62a11b0268
-
SHA256
358b3681682b402dba9c1bf1297193fe257d8cc11e51c2924c657eb2057beb04
-
SHA512
e3e7954328a98af7b4dd3ec0efa2c390f6d10b8e2037e582043902482f7e90241b0565c0da7972f14193efe517a305441306cb7c32b2f444ba5c58c1c7c5f2da
-
SSDEEP
24576:Lw/UH7Q9OEKM4TbVOD6s6F+2iYNenwhhWZ0ZnLsm:FH7QAHTbVOD6sl2Zhh
Static task
static1
Behavioral task
behavioral1
Sample
380cd105672b970a3783c0036ebaf09d.exe
Resource
win7-20231215-en
Malware Config
Extracted
quasar
2.1.0.0
SEP05
23.105.131.187:7812
VNM_MUTEX_mn3z5p1P4yabWtL9nJ
-
encryption_key
R5zGfMq4QEUio50PoLwo
-
install_name
Windows Defender Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Update Service
-
subdirectory
Windows Security Firewall
Targets
-
-
Target
380cd105672b970a3783c0036ebaf09d
-
Size
1.0MB
-
MD5
380cd105672b970a3783c0036ebaf09d
-
SHA1
112ee91c03921b1aaa3ca9b901054a62a11b0268
-
SHA256
358b3681682b402dba9c1bf1297193fe257d8cc11e51c2924c657eb2057beb04
-
SHA512
e3e7954328a98af7b4dd3ec0efa2c390f6d10b8e2037e582043902482f7e90241b0565c0da7972f14193efe517a305441306cb7c32b2f444ba5c58c1c7c5f2da
-
SSDEEP
24576:Lw/UH7Q9OEKM4TbVOD6s6F+2iYNenwhhWZ0ZnLsm:FH7QAHTbVOD6sl2Zhh
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1