General
-
Target
ItroublveTSC.exe
-
Size
2.0MB
-
Sample
240408-kxczssdd58
-
MD5
7c2da2ae36228b8b66ec5e5029e90d08
-
SHA1
d636baf89fd305a1f694611097ac6e7bcb1f244c
-
SHA256
c6820f426b28b93295ca3b768780e8b372424fb72e94b5d0c094b030f53d4721
-
SHA512
93cbc698211b0ab0f96ab3f0eb8d393bcd04580418e08fc6df9b935a7cdd091b619a0edab4771b4c887264b0eef6846e6e08a7be24a8681848a1885206a29960
-
SSDEEP
49152:DL+qgtiXBVLcHD/QmJqRsVEzCeePMAnUD:OzcBVYHDjcyVMukAUD
Static task
static1
Behavioral task
behavioral1
Sample
ItroublveTSC.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
2.1.0.0
Office04
zaidtheboii-50153.portmap.host:50153
VNM_MUTEX_fNWmZ9wa8oprRXUo73
-
encryption_key
PJRTtGrfOi1c09c0GCYT
-
install_name
OneDrive.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft One Drive
-
subdirectory
Microsoft One Drive
Targets
-
-
Target
ItroublveTSC.exe
-
Size
2.0MB
-
MD5
7c2da2ae36228b8b66ec5e5029e90d08
-
SHA1
d636baf89fd305a1f694611097ac6e7bcb1f244c
-
SHA256
c6820f426b28b93295ca3b768780e8b372424fb72e94b5d0c094b030f53d4721
-
SHA512
93cbc698211b0ab0f96ab3f0eb8d393bcd04580418e08fc6df9b935a7cdd091b619a0edab4771b4c887264b0eef6846e6e08a7be24a8681848a1885206a29960
-
SSDEEP
49152:DL+qgtiXBVLcHD/QmJqRsVEzCeePMAnUD:OzcBVYHDjcyVMukAUD
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-