General
-
Target
2024-08-18_b07903a55bdb2c7ed7895fdeba690458_cova_magniber
-
Size
8.1MB
-
Sample
240818-a7eahayhmp
-
MD5
b07903a55bdb2c7ed7895fdeba690458
-
SHA1
00eb5c9e340664df33ea9369179de712bc5d0773
-
SHA256
205f00610ab36450d86ad8ebfe7a0f0af7aa757803503ea4de1f82c78e6dedd3
-
SHA512
cb5df616f85177175e4543b7cda2010275c935f527cfb17c3a384884e6de4dd00a8f676c8e437c9a303573c08419f2f5c8fc30058493ba49abecfd65cae81bef
-
SSDEEP
196608:B9ofsgFUjh5JMULHIEEUgILxbhVebH0h9HU5NHZlcP/VMfif:B9ofsuUjh5JMULHIEEUgILxbhVebH07H
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-18_b07903a55bdb2c7ed7895fdeba690458_cova_magniber.exe
Resource
win7-20240729-en
Malware Config
Extracted
quasar
1.4.0
4Drun
185.148.3.216:4000
c3557859-56ac-475e-b44d-e1b60c20d0d0
-
encryption_key
B000736BEBDF08FC1B6696200651882CF57E43E7
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
3dfx Startup
-
subdirectory
SubDir
Extracted
asyncrat
0.5.7B
Default
185.148.3.216:2000
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
4Drs.exe
-
install_folder
%AppData%
Targets
-
-
Target
2024-08-18_b07903a55bdb2c7ed7895fdeba690458_cova_magniber
-
Size
8.1MB
-
MD5
b07903a55bdb2c7ed7895fdeba690458
-
SHA1
00eb5c9e340664df33ea9369179de712bc5d0773
-
SHA256
205f00610ab36450d86ad8ebfe7a0f0af7aa757803503ea4de1f82c78e6dedd3
-
SHA512
cb5df616f85177175e4543b7cda2010275c935f527cfb17c3a384884e6de4dd00a8f676c8e437c9a303573c08419f2f5c8fc30058493ba49abecfd65cae81bef
-
SSDEEP
196608:B9ofsgFUjh5JMULHIEEUgILxbhVebH0h9HU5NHZlcP/VMfif:B9ofsuUjh5JMULHIEEUgILxbhVebH07H
-
Quasar payload
-
Async RAT payload
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Create or Modify System Process
2Windows Service
2Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1