General
-
Target
QusilianEXECUTOR_ON_TOP_1 (beta).exe
-
Size
26.0MB
-
Sample
240602-v7ayasaf22
-
MD5
c60f3ff93c06b80b430903777bcf665b
-
SHA1
03148ab6f0bf3f7b138d3d7051b46f16da88061d
-
SHA256
f72ef990aef15ddaa137d36ed455b1a323cdeacef330811c38d340b40573ed8e
-
SHA512
94987fa4005f9e65e581347b60501cd3f9cf69189679473017c415f3a3c2ef6112b271f0ca05c4a56f17e8377b8b52e425d85197f62f11a7cfdfce77f53ed8ee
-
SSDEEP
393216:8gqUZxt8HtlQVtQ2VVyD17w8R1gHu9chVekgE9bBkT0iz252RjUfuQCT/e:dZxWHtleTyDJDM8E9b40cRjU3o/
Static task
static1
Behavioral task
behavioral1
Sample
QusilianEXECUTOR_ON_TOP_1 (beta).exe
Resource
win7-20240220-en
Malware Config
Targets
-
-
Target
QusilianEXECUTOR_ON_TOP_1 (beta).exe
-
Size
26.0MB
-
MD5
c60f3ff93c06b80b430903777bcf665b
-
SHA1
03148ab6f0bf3f7b138d3d7051b46f16da88061d
-
SHA256
f72ef990aef15ddaa137d36ed455b1a323cdeacef330811c38d340b40573ed8e
-
SHA512
94987fa4005f9e65e581347b60501cd3f9cf69189679473017c415f3a3c2ef6112b271f0ca05c4a56f17e8377b8b52e425d85197f62f11a7cfdfce77f53ed8ee
-
SSDEEP
393216:8gqUZxt8HtlQVtQ2VVyD17w8R1gHu9chVekgE9bBkT0iz252RjUfuQCT/e:dZxWHtleTyDJDM8E9b40cRjU3o/
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-