General
-
Target
Pix_id8680.js
-
Size
18KB
-
Sample
240724-bb5m9aydpm
-
MD5
1311ee7d5350ada4e1670432f2f2618f
-
SHA1
e25c980202fcdf06511734c37ca703e012626c62
-
SHA256
e38b8f0ae53c24d62f7b0580891be2bfc4a3c855dcf2ee01fc64c0439777bdc9
-
SHA512
187f23f3a381563c2eeb9c273ddd34bd9c044283579f6000a1dc6595a62aa50cf4faa28f644107140f66a8e234bf5258bfcc30930c70143edcdf966c747a814a
-
SSDEEP
384:PnmDxlzTVyhWrKLDrRX/Y3CBOj0xDusFM623U84:vmDxvVQrB/YSBOj0xKsMlH4
Static task
static1
Behavioral task
behavioral1
Sample
Pix_id8680.js
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Pix_id8680.js
Resource
win10v2004-20240709-en
Malware Config
Extracted
https://pastebin.com/raw/gk5zDwdG
https://drive.google.com/uc?export=download&id=
Extracted
quasar
2.8.0.1
Recomeco
15.235.61.212:5552
rQp3LFG3Jkv7ob8MOH
-
encryption_key
VYA1GjjnuckdAWisXsLT
-
install_name
Venom.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
Targets
-
-
Target
Pix_id8680.js
-
Size
18KB
-
MD5
1311ee7d5350ada4e1670432f2f2618f
-
SHA1
e25c980202fcdf06511734c37ca703e012626c62
-
SHA256
e38b8f0ae53c24d62f7b0580891be2bfc4a3c855dcf2ee01fc64c0439777bdc9
-
SHA512
187f23f3a381563c2eeb9c273ddd34bd9c044283579f6000a1dc6595a62aa50cf4faa28f644107140f66a8e234bf5258bfcc30930c70143edcdf966c747a814a
-
SSDEEP
384:PnmDxlzTVyhWrKLDrRX/Y3CBOj0xDusFM623U84:vmDxvVQrB/YSBOj0xKsMlH4
-
Quasar payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Adds Run key to start application
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-