General

  • Target

    62ae14d3dd02e1b12d50084d22ca02ada727f525de08f77ed932deb7d1db7f01

  • Size

    969KB

  • Sample

    240918-rpbkbswfnn

  • MD5

    b2a8e67cfd31a6e87eec14124749652e

  • SHA1

    6b31fa8adca73dfff6ed66164d583b21707302b9

  • SHA256

    62ae14d3dd02e1b12d50084d22ca02ada727f525de08f77ed932deb7d1db7f01

  • SHA512

    ac5f4d674369057458dc78a8f460f3e822760c080052e07569dec43d375263a07faa7ec28b817ee8661d25d9a3afac849f0fe8ccb141655402ee0edc497ffb7b

  • SSDEEP

    24576:IiWiBxDrVBPcI02raqSLqntMLEVlTlv0EPKv43lYS+dhc5:XnyqSLqtMusA04IdE

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

ShanjQhandohDBT4

C2

127.0.0.1:4782

Mutex

VNM_MUTEX_TsedL3VlE1RYgzxmD0

Attributes
  • encryption_key

    n36uZkPlhyNINnnTiI80

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Microsoft Corporation

  • subdirectory

    SubDir

Targets

    • Target

      CATALOGUE2024.GBLTD.bat

    • Size

      1.1MB

    • MD5

      d276007d99a3f3aa1f0c9d85857f580b

    • SHA1

      d2a920b76ceb676c5cced1504bea5056824c942d

    • SHA256

      4b32b987a1815005b4cce599f2691cf7600433da1886a3e4d79fa80ac85df8d7

    • SHA512

      ba1fb1e882c3d4f86d2cb02fe2b7883de1b47bb16fb9e3e418d36a77f8d1e87fb13a4df2557db909ee0b4896f38fda0026ca8002d19c1b26e89c090bec906639

    • SSDEEP

      24576:peq3eRCl8rvXzpmsCraU8hgHjUBE5zxLv0SPuvi3lnQUpxLJY:IRCirbjU8hgDU6CWoiWixO

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender Real-time Protection settings

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • VenomRAT

      VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks