General
-
Target
https://mega.nz/file/Z09FHCqQ#oKEk_Od_s85u61Db6ftPGH22-pL6t1UTyAUk3Tk6AAs
-
Sample
240717-drw26awfmc
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/Z09FHCqQ#oKEk_Od_s85u61Db6ftPGH22-pL6t1UTyAUk3Tk6AAs
Resource
win10v2004-20240709-en
Malware Config
Extracted
quasar
1.4.1
Steam
20.ip.gl.ply.gg:55257
15d4edb7-40c0-4a95-9dc8-8fe93071bce0
-
encryption_key
F1B995FFCFBEAA3218870A13F82413DC65D82218
-
install_name
Steam.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SteamClient
-
subdirectory
%appdata%
Targets
-
-
Target
https://mega.nz/file/Z09FHCqQ#oKEk_Od_s85u61Db6ftPGH22-pL6t1UTyAUk3Tk6AAs
-
Detect Umbral payload
-
Quasar payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-