General
-
Target
7c5919ffcd3234d3c520120fbbeb9204e11ca3adfbfc175175a1e087492cbbba.exe
-
Size
5.9MB
-
Sample
240614-bxk6qszdra
-
MD5
12f9b68ed66fed9a1e3c1c2319c837c6
-
SHA1
e423cbd003c718b6fa268de83806dae6a9fe88c3
-
SHA256
7c5919ffcd3234d3c520120fbbeb9204e11ca3adfbfc175175a1e087492cbbba
-
SHA512
b649639d2363f135f694f8d5968a6b7adabd76ef793a3fb9313b1c142a0e749be33a5831c4d0cbc32ea170a2100f693755b378280f252dd50bd1ddf008b1ba53
-
SSDEEP
98304:pMI+LjNr86mjj/UYviu26bbyKS2myX0rPgIh:p8Vmj72wblTmyEgG
Behavioral task
behavioral1
Sample
7c5919ffcd3234d3c520120fbbeb9204e11ca3adfbfc175175a1e087492cbbba.exe
Resource
win7-20240611-en
Malware Config
Extracted
quasar
2.1.0.0
windows security
quasarrat220-24487.portmap.io:24487
VNM_MUTEX_mOPqShedZxvAqgLrWL
-
encryption_key
7mvA2TfKjvMIY0zZeMKF
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
7c5919ffcd3234d3c520120fbbeb9204e11ca3adfbfc175175a1e087492cbbba.exe
-
Size
5.9MB
-
MD5
12f9b68ed66fed9a1e3c1c2319c837c6
-
SHA1
e423cbd003c718b6fa268de83806dae6a9fe88c3
-
SHA256
7c5919ffcd3234d3c520120fbbeb9204e11ca3adfbfc175175a1e087492cbbba
-
SHA512
b649639d2363f135f694f8d5968a6b7adabd76ef793a3fb9313b1c142a0e749be33a5831c4d0cbc32ea170a2100f693755b378280f252dd50bd1ddf008b1ba53
-
SSDEEP
98304:pMI+LjNr86mjj/UYviu26bbyKS2myX0rPgIh:p8Vmj72wblTmyEgG
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar payload
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing artifacts associated with disabling Widnows Defender
-
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-