General
-
Target
ec5fa919b523ea3effb48a867b496d30a3bbf2208bc5652f812ebd0d87889ad0
-
Size
4.8MB
-
Sample
240531-fb9dnafd5x
-
MD5
a7162b6eabcdb753b8ec85bda90af43c
-
SHA1
e837aa3e994604f84c3adb4f6a10dc602e326a3e
-
SHA256
ec5fa919b523ea3effb48a867b496d30a3bbf2208bc5652f812ebd0d87889ad0
-
SHA512
3aeb0173d2169d9607a9e9e12c6ded9a2e0ab68b3c522ef287d3d5245b8c9eceec903685e30698711678664c6e002f09c224b61eaadd0cd54e1646104da8a4e4
-
SSDEEP
98304:seblXFo9C2j9+slcz8nUN6aaVFS0yi8hjOkWHCDwfIH7gDEgpzx:jZXFiCzsqz8JVFw/mHUwIMoCz
Behavioral task
behavioral1
Sample
ec5fa919b523ea3effb48a867b496d30a3bbf2208bc5652f812ebd0d87889ad0.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
1.4.1
dilly
lvke-45989.portmap.host:45989
0cb49dc2-fd0d-4581-ae1e-04154c41f310
-
encryption_key
E5250226804167CB0B1B4B0E9667D0C056694DCA
-
install_name
defenderx64.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Defender Helper
-
subdirectory
en
Targets
-
-
Target
ec5fa919b523ea3effb48a867b496d30a3bbf2208bc5652f812ebd0d87889ad0
-
Size
4.8MB
-
MD5
a7162b6eabcdb753b8ec85bda90af43c
-
SHA1
e837aa3e994604f84c3adb4f6a10dc602e326a3e
-
SHA256
ec5fa919b523ea3effb48a867b496d30a3bbf2208bc5652f812ebd0d87889ad0
-
SHA512
3aeb0173d2169d9607a9e9e12c6ded9a2e0ab68b3c522ef287d3d5245b8c9eceec903685e30698711678664c6e002f09c224b61eaadd0cd54e1646104da8a4e4
-
SSDEEP
98304:seblXFo9C2j9+slcz8nUN6aaVFS0yi8hjOkWHCDwfIH7gDEgpzx:jZXFiCzsqz8JVFw/mHUwIMoCz
-
Quasar payload
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Detects executables packed with Themida
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-