General
-
Target
CraxsV7.2.zip
-
Size
491.7MB
-
Sample
240219-xxvaasbc3w
-
MD5
bb70ba93d3757f8250a779be1ffa7514
-
SHA1
2bad7c63b3bf96f495a59bc7c4cd652d97073c73
-
SHA256
358da4f1aa792a6d5c6ed2d4ff4c1420e6bb0869cb406f2c3db47163313e4d0c
-
SHA512
b9816167d3a6fd8171eda2d0b68518c55594e5cf605e4d1a8c38269c1a3852b8ecd9fbd3a79bebd8f8ed57ae11756b0b0ed7385e16ea8ddce8d3e1fc526afffa
-
SSDEEP
12582912:7S+F/sJhIJobjj0PzQgvhFdabG5BiV84Il3uuNu+wjEIXXn:fFNeqbeqFE7EIn
Malware Config
Extracted
quasar
1.4.1
Java
129.159.225.178:19345
f30083ae-f891-4ba5-9748-d5ee66ca83cb
-
encryption_key
D3AA51BB478427F5ADF9A26B1CDC35FD1757D450
-
install_name
Java.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Java
-
subdirectory
Java
Targets
-
-
Target
CraxsV7.2.zip
-
Size
491.7MB
-
MD5
bb70ba93d3757f8250a779be1ffa7514
-
SHA1
2bad7c63b3bf96f495a59bc7c4cd652d97073c73
-
SHA256
358da4f1aa792a6d5c6ed2d4ff4c1420e6bb0869cb406f2c3db47163313e4d0c
-
SHA512
b9816167d3a6fd8171eda2d0b68518c55594e5cf605e4d1a8c38269c1a3852b8ecd9fbd3a79bebd8f8ed57ae11756b0b0ed7385e16ea8ddce8d3e1fc526afffa
-
SSDEEP
12582912:7S+F/sJhIJobjj0PzQgvhFdabG5BiV84Il3uuNu+wjEIXXn:fFNeqbeqFE7EIn
-
Quasar payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-