General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
Family
quasar
Version
2.1.0.0
Botnet
Mîcrosoft
C2
84.32.231.214:9548
Mutex
VNM_MUTEX_EK29o1D9hJEsUw2hN0
Attributes
-
encryption_key
Y7gS0QOWklh1tATK3qYy
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
https://www.dosya.tc/server/ahlbm7/ASEvDCnMjfY8fqfkdCK.exe.html
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar family
-
Quasar payload
-
Venomrat family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-