General
-
Target
TikTokBot.exe
-
Size
534KB
-
Sample
240911-v2he7atdqd
-
MD5
22916453f988c9660b4c7c12b7e021b3
-
SHA1
f662549f7d5fb24fe72c2f5f82e1d661b9efcdff
-
SHA256
5bdd21c031e8d79b4bd9fc49dbb612d8a24fc652cf6df24c0fcb473c5abcfed8
-
SHA512
7df8cb2fc2b4da6f99e53fb7496621fcb6c4cba7c8ecd40ae763ac5ac6c599520339465337b7b7e4bccf988701af7a87055377187c63d41ae60d7f0f291f6c65
-
SSDEEP
6144:l8fGxBIgrx8kFYLTiMkbCs0KrTXLYzAR7bloVhfSP8tTsKv8CZ45uusDGy3V8/GR:BPx7FYPiMTsLXczA2tS2sKUCBujq
Behavioral task
behavioral1
Sample
TikTokBot.exe
Resource
win7-20240708-es
Malware Config
Extracted
quasar
2.1.0.0
Slave
eu-west-36307.packetriot.net:22471
VNM_MUTEX_c2q7y2ayYutZ2XaYe7
-
encryption_key
uKN8xUJGqzjjCLO8arNy
-
install_name
Mm2Dupe.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Targets
-
-
Target
TikTokBot.exe
-
Size
534KB
-
MD5
22916453f988c9660b4c7c12b7e021b3
-
SHA1
f662549f7d5fb24fe72c2f5f82e1d661b9efcdff
-
SHA256
5bdd21c031e8d79b4bd9fc49dbb612d8a24fc652cf6df24c0fcb473c5abcfed8
-
SHA512
7df8cb2fc2b4da6f99e53fb7496621fcb6c4cba7c8ecd40ae763ac5ac6c599520339465337b7b7e4bccf988701af7a87055377187c63d41ae60d7f0f291f6c65
-
SSDEEP
6144:l8fGxBIgrx8kFYLTiMkbCs0KrTXLYzAR7bloVhfSP8tTsKv8CZ45uusDGy3V8/GR:BPx7FYPiMTsLXczA2tS2sKUCBujq
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1