General

  • Target

    1847fe775124ff748eff65fde03a4cc3

  • Size

    394KB

  • Sample

    231224-25g26abhe4

  • MD5

    1847fe775124ff748eff65fde03a4cc3

  • SHA1

    84eb8486cd503e3ed4f64242cd6c18f8c939ee7f

  • SHA256

    c9deff45942213d2e685f7b8c81568c35e7d93f99e22b260051dba54d4c60c8b

  • SHA512

    1e215fc42fc1bca1f8dc56b4e180154462193e6f7847ba84b0d6821bcbebeebab203ad659e19bab1099f7fa5e6c9782c2c53ef40b5d4892fcc89ab56b7a77d6f

  • SSDEEP

    12288:3LPv0G05zrYUlP7aOsjdccUiDe2tmlUiOQ:bH0GWzrRlfsh4ia

Malware Config

Targets

    • Target

      1847fe775124ff748eff65fde03a4cc3

    • Size

      394KB

    • MD5

      1847fe775124ff748eff65fde03a4cc3

    • SHA1

      84eb8486cd503e3ed4f64242cd6c18f8c939ee7f

    • SHA256

      c9deff45942213d2e685f7b8c81568c35e7d93f99e22b260051dba54d4c60c8b

    • SHA512

      1e215fc42fc1bca1f8dc56b4e180154462193e6f7847ba84b0d6821bcbebeebab203ad659e19bab1099f7fa5e6c9782c2c53ef40b5d4892fcc89ab56b7a77d6f

    • SSDEEP

      12288:3LPv0G05zrYUlP7aOsjdccUiDe2tmlUiOQ:bH0GWzrRlfsh4ia

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • UAC bypass

    • Windows security bypass

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

2
T1543

Windows Service

2
T1543.003

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

8
T1112

Impair Defenses

4
T1562

Disable or Modify Tools

4
T1562.001

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Tasks