Resubmissions

07-11-2024 02:17

241107-cq8h5avrbq 10

06-11-2024 22:40

241106-2llk8s1raj 10

General

  • Target

    0d87ba1290e9b29d1f1d3cbf7bc06992.LHA

  • Size

    778KB

  • Sample

    241107-cq8h5avrbq

  • MD5

    0d87ba1290e9b29d1f1d3cbf7bc06992

  • SHA1

    4a4b025cdd9c7e5414b6d1b6fc3bd68446a3cfe5

  • SHA256

    dd48521142eddeff589404be6780f58bcdc07c0e4e4348f19ec84d73adaffb25

  • SHA512

    f231e7bcc27188dfaf11997a6887e33f794d03101fd0a8aa5043f5fa8151cd3b157dd5cdec94c3a77d5fe93813cbf5a2818e4cc5885313e27e0250e70da20230

  • SSDEEP

    24576:WQdso+guKotxr/P/mwHAvBmbiYczbodD//UJS4:x7uKCN3/lGmbiY4uDHUx

Malware Config

Targets

    • Target

      procesosCUI7254178000020150023000.exe

    • Size

      908KB

    • MD5

      e93703d8357807ba8be42ce5bd71d99b

    • SHA1

      f557b727748f4aa01265b2bc8e46b6201b5f3b7c

    • SHA256

      fa083a970c90e1e17f4aa83ccd7f0bf52b5e0f35eaf4eeda73abdc115d9b55b9

    • SHA512

      b8ad5c57586b70a769d1f9562148de63a3c5835d6a35d3302f33d4d20619254ae5ae6a1703fb26aaa574d96ba15b053359fe0b17059577256a86ebeb53a9b5af

    • SSDEEP

      24576:Fg/fK9XbMAWE9XEhG7q9efZyHS7en+gIlh:q4Mj4088HS7e+gIlh

    • Contains code to disable Windows Defender

      A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • UAC bypass

    • Windows security bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies Security services

      Modifies the startup behavior of a security service.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks