General
-
Target
https://drive.google.com/file/d/19dtPJV6XBEH8ZjCCr3OlGMEzgJOkNogL/view?pli=1
-
Sample
241006-pyw7aavamr
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/19dtPJV6XBEH8ZjCCr3OlGMEzgJOkNogL/view?pli=1
Resource
win10-20240404-en
windows10-1703-x64
28 signatures
1200 seconds
Malware Config
Extracted
Family
quasar
Version
1.4.0
Botnet
EaseUSTodo
C2
officeworld.freeddns.org:8898
mianoffice221.kozow.com:8898
Mutex
a9a13ab7-c562-46fd-bbd2-326a345c4bf8
Attributes
-
encryption_key
2EA31F57ED19DE155F86E8C6311EB312416F74DC
-
install_name
Client.exe
-
log_directory
CrashLogs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
https://drive.google.com/file/d/19dtPJV6XBEH8ZjCCr3OlGMEzgJOkNogL/view?pli=1
-
Detect ZGRat V2
-
Modifies WinLogon for persistence
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-