Resubmissions
22-05-2024 16:28
240522-tywmzahb27 10General
-
Target
Loader.exe
-
Size
24.6MB
-
Sample
240522-tywmzahb27
-
MD5
0bbe9763f6ca8dde51dceecd8c15bf16
-
SHA1
686df2ce62a32a65ca5e82b0ae3b00b243d3cb43
-
SHA256
e8a3a56be00250fe8894b669c5409d05c50f5f0555039e0572b5056b269f24d9
-
SHA512
631d262a6c434361fc214504540e1c50ea929971c5433724864d8e069028e767e09e2507ab83a9b7554dbb777568bb672ab6f771fc6d9a2c04f2027aa3cd4464
-
SSDEEP
393216:ecTVwTQsEe+NUryAT551+swSSLgNJBoM5lELqwhXwazfb35x08kHHQgDnYF:echw0myATDhOLgfmMU6MfDQlH5nC
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Loader.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
quasar
1.4.1
barbu
bardu3662.duckdns.org:9733
afa58199-2aae-4e08-8ef4-8e4ef39bc0aa
-
encryption_key
080342EF5ED2B5D16317695CC4327BF2FFC034AA
-
install_name
RuntimeBroker.exe
-
log_directory
Logs
-
reconnect_delay
1000
-
startup_key
Updater
-
subdirectory
ApplicationFrameHost
Targets
-
-
Target
Loader.exe
-
Size
24.6MB
-
MD5
0bbe9763f6ca8dde51dceecd8c15bf16
-
SHA1
686df2ce62a32a65ca5e82b0ae3b00b243d3cb43
-
SHA256
e8a3a56be00250fe8894b669c5409d05c50f5f0555039e0572b5056b269f24d9
-
SHA512
631d262a6c434361fc214504540e1c50ea929971c5433724864d8e069028e767e09e2507ab83a9b7554dbb777568bb672ab6f771fc6d9a2c04f2027aa3cd4464
-
SSDEEP
393216:ecTVwTQsEe+NUryAT551+swSSLgNJBoM5lELqwhXwazfb35x08kHHQgDnYF:echw0myATDhOLgfmMU6MfDQlH5nC
-
Quasar payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1