General
-
Target
RDP Brute_Cracked.exe
-
Size
1.7MB
-
Sample
240712-bfemmascpk
-
MD5
bd5cd7f77a38e709cb03b8b60cfcc15c
-
SHA1
ed59b52ea4c63ffd6322bcb43155f2245048a541
-
SHA256
4f66d0ced260b21359d60081d26c57bdeb3b54a293d084201589019d79379e8e
-
SHA512
0f5973d3b16362cc2540065188bd3650be6622a8bf3b1bb6e310ec3f395292b916c0b1dd3514497a78efee847da16bf559eb21b3225d80ffb4ded4819a8a4b63
-
SSDEEP
24576:Cj5yx6uJa4WiXV15W/F4A8A3GpF8EfE1FF1ehGXeRxm8F0EJSoUkgBbt:e59+WaV1J6GpFDEV1eEox10EPEbt
Static task
static1
Behavioral task
behavioral1
Sample
RDP Brute_Cracked.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
quasar
2.1.0.0
kgf6
23.105.131.187:7812
VNM_MUTEX_Yv6S9FB2pcVgrrmUN6
-
encryption_key
4Kz1OwOQ5f9Qc8aAEQ9S
-
install_name
Windows Security Health Service.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Update
-
subdirectory
SubDir
Extracted
quasar
2.1.0.0
kgf5
23.105.131.187:7812
VNM_MUTEX_NOLy9wmTFSi1F4L2HO
-
encryption_key
8jlBZS9It7EamPWEVqxP
-
install_name
Windows Defender Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Security
-
subdirectory
SubDir
Targets
-
-
Target
RDP Brute_Cracked.exe
-
Size
1.7MB
-
MD5
bd5cd7f77a38e709cb03b8b60cfcc15c
-
SHA1
ed59b52ea4c63ffd6322bcb43155f2245048a541
-
SHA256
4f66d0ced260b21359d60081d26c57bdeb3b54a293d084201589019d79379e8e
-
SHA512
0f5973d3b16362cc2540065188bd3650be6622a8bf3b1bb6e310ec3f395292b916c0b1dd3514497a78efee847da16bf559eb21b3225d80ffb4ded4819a8a4b63
-
SSDEEP
24576:Cj5yx6uJa4WiXV15W/F4A8A3GpF8EfE1FF1ehGXeRxm8F0EJSoUkgBbt:e59+WaV1J6GpFDEV1eEox10EPEbt
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1