General
-
Target
0x00080000000174cc-36.dat
-
Size
534KB
-
Sample
241102-sr8taaxgma
-
MD5
81b2c5c64951b603480d40d321540ff2
-
SHA1
314199ad92baeb203f5555ff3814e9b7a4f226f8
-
SHA256
b893220d33f9b8a0f98702bb577e4459792253ae651bdc18a93145ccd008af54
-
SHA512
3a57655bf7aa18a34364659553aad26a3d5b8946b957441f5fedebab5936b6bb2c71c6337837ead486a001b6a9227437cc5c4ec4a5de627f0e2db10dc6afdea6
-
SSDEEP
6144:78fG1BIgrx8kFYLTiMkbQEju0KoivMbi7DSVmh6Khe535h+GofOlblwXH/Gy3V8O:HPx7FYPiMQRcRDF4uy33ofAblwX2S
Behavioral task
behavioral1
Sample
0x00080000000174cc-36.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
2.1.0.0
Office04
146.190.29.250:7812
VNM_MUTEX_h1gQxrpyccCFZq7JPS
-
encryption_key
V5fWyT4tQqXFouaUUxe2
-
install_name
Windows Security.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Update
-
subdirectory
SubDir34
Targets
-
-
Target
0x00080000000174cc-36.dat
-
Size
534KB
-
MD5
81b2c5c64951b603480d40d321540ff2
-
SHA1
314199ad92baeb203f5555ff3814e9b7a4f226f8
-
SHA256
b893220d33f9b8a0f98702bb577e4459792253ae651bdc18a93145ccd008af54
-
SHA512
3a57655bf7aa18a34364659553aad26a3d5b8946b957441f5fedebab5936b6bb2c71c6337837ead486a001b6a9227437cc5c4ec4a5de627f0e2db10dc6afdea6
-
SSDEEP
6144:78fG1BIgrx8kFYLTiMkbQEju0KoivMbi7DSVmh6Khe535h+GofOlblwXH/Gy3V8O:HPx7FYPiMQRcRDF4uy33ofAblwX2S
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar family
-
Quasar payload
-
Venomrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1