General

  • Target

    0x00080000000174cc-36.dat

  • Size

    534KB

  • Sample

    241102-sr8taaxgma

  • MD5

    81b2c5c64951b603480d40d321540ff2

  • SHA1

    314199ad92baeb203f5555ff3814e9b7a4f226f8

  • SHA256

    b893220d33f9b8a0f98702bb577e4459792253ae651bdc18a93145ccd008af54

  • SHA512

    3a57655bf7aa18a34364659553aad26a3d5b8946b957441f5fedebab5936b6bb2c71c6337837ead486a001b6a9227437cc5c4ec4a5de627f0e2db10dc6afdea6

  • SSDEEP

    6144:78fG1BIgrx8kFYLTiMkbQEju0KoivMbi7DSVmh6Khe535h+GofOlblwXH/Gy3V8O:HPx7FYPiMQRcRDF4uy33ofAblwX2S

Malware Config

Extracted

Family

quasar

Version

2.1.0.0

Botnet

Office04

C2

146.190.29.250:7812

Mutex

VNM_MUTEX_h1gQxrpyccCFZq7JPS

Attributes
  • encryption_key

    V5fWyT4tQqXFouaUUxe2

  • install_name

    Windows Security.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Update

  • subdirectory

    SubDir34

Targets

    • Target

      0x00080000000174cc-36.dat

    • Size

      534KB

    • MD5

      81b2c5c64951b603480d40d321540ff2

    • SHA1

      314199ad92baeb203f5555ff3814e9b7a4f226f8

    • SHA256

      b893220d33f9b8a0f98702bb577e4459792253ae651bdc18a93145ccd008af54

    • SHA512

      3a57655bf7aa18a34364659553aad26a3d5b8946b957441f5fedebab5936b6bb2c71c6337837ead486a001b6a9227437cc5c4ec4a5de627f0e2db10dc6afdea6

    • SSDEEP

      6144:78fG1BIgrx8kFYLTiMkbQEju0KoivMbi7DSVmh6Khe535h+GofOlblwXH/Gy3V8O:HPx7FYPiMQRcRDF4uy33ofAblwX2S

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender Real-time Protection settings

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • VenomRAT

      VenomRAT is a modified version of QuasarRAT with some added features, such as rootkit and stealer capabilites.

    • Venomrat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks