General
-
Target
Oski Cracked.exe
-
Size
4.7MB
-
Sample
240511-pz49aage6t
-
MD5
fae4c2fc795b054c80d57ad600f8447f
-
SHA1
94ef84328a4c1c864307870d8e98cc4b6d334dd5
-
SHA256
579e9d2e534610d36fa6073b825f8caffc41f1f20dad0cfd1749ca12d202a11c
-
SHA512
35da6d3abc97cea70fb573d45f5bd528f5550d478a464f40dd1455f453c65a16283d3a5106aa9e488d3674db5d0ec7009a0cfd30d026afc4220e829f32075be9
-
SSDEEP
98304:PahEJCbuSMburCaMZh0yEKj+WRvrY1dcZ048HV/bFy8jJ7LUdVmi:PahmmMbuQZlFY7KsZPNLUdQ
Behavioral task
behavioral1
Sample
Oski Cracked.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
quasar
2.1.0.0
Windows Security
23.105.131.187:7812
VNM_MUTEX_CXpgUhDot7jvhF7S9O
-
encryption_key
1mVKopYcKhmQLOzLUk5T
-
install_name
Windows Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Update Service
-
subdirectory
SubDir
Targets
-
-
Target
Oski Cracked.exe
-
Size
4.7MB
-
MD5
fae4c2fc795b054c80d57ad600f8447f
-
SHA1
94ef84328a4c1c864307870d8e98cc4b6d334dd5
-
SHA256
579e9d2e534610d36fa6073b825f8caffc41f1f20dad0cfd1749ca12d202a11c
-
SHA512
35da6d3abc97cea70fb573d45f5bd528f5550d478a464f40dd1455f453c65a16283d3a5106aa9e488d3674db5d0ec7009a0cfd30d026afc4220e829f32075be9
-
SSDEEP
98304:PahEJCbuSMburCaMZh0yEKj+WRvrY1dcZ048HV/bFy8jJ7LUdVmi:PahmmMbuQZlFY7KsZPNLUdQ
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1