General
-
Target
4942e9c13479bc1a62bdb07b23474e3c.exe
-
Size
639KB
-
Sample
240107-xsjm1ache3
-
MD5
4942e9c13479bc1a62bdb07b23474e3c
-
SHA1
d7a7283939a2fa4506b47fa809431b9cc4d2559e
-
SHA256
5b11f30be6e3bfb808c25d07b492cfa12840fd0efa795d8af397feba045d1c59
-
SHA512
8c8edd299922fcfa100e3e725d1b09259a86e41546361273c386177a3e2a765ffc76169a5b9d142efb4c5335bee3805c1f908c7f4edae0f0a33f2631a037eb59
-
SSDEEP
12288:66bJhnrd2Qsm/+/dnGz7O0Y244sMYcoFMVyMg+Yy1Wcwemn58WgxWM:6kJhngpn9kNsMwbMgkK58WgQM
Static task
static1
Behavioral task
behavioral1
Sample
4942e9c13479bc1a62bdb07b23474e3c.exe
Resource
win7-20231215-en
Malware Config
Extracted
quasar
2.1.0.0
SEP05
23.105.131.187:7812
VNM_MUTEX_ea14HLQ5adxyrFdD2X
-
encryption_key
jUWfdDb1toPE0KAlGJWH
-
install_name
Windows Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Update Service
-
subdirectory
Windows Security Update
Targets
-
-
Target
4942e9c13479bc1a62bdb07b23474e3c.exe
-
Size
639KB
-
MD5
4942e9c13479bc1a62bdb07b23474e3c
-
SHA1
d7a7283939a2fa4506b47fa809431b9cc4d2559e
-
SHA256
5b11f30be6e3bfb808c25d07b492cfa12840fd0efa795d8af397feba045d1c59
-
SHA512
8c8edd299922fcfa100e3e725d1b09259a86e41546361273c386177a3e2a765ffc76169a5b9d142efb4c5335bee3805c1f908c7f4edae0f0a33f2631a037eb59
-
SSDEEP
12288:66bJhnrd2Qsm/+/dnGz7O0Y244sMYcoFMVyMg+Yy1Wcwemn58WgxWM:6kJhngpn9kNsMwbMgkK58WgQM
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1