General

  • Target

    Passware Kit Forensic 2021 Pre-patched retail installer.exe

  • Size

    381.5MB

  • Sample

    241112-2n383awldm

  • MD5

    298faa0669e7d439d1ba4a3d641cc619

  • SHA1

    093f271f3c1b4b6e6b948ee61b01ac2c7c02a0fd

  • SHA256

    344b9876db6b8649b9d65448a715b1923011ea9146e116908eb4d35bd8fa3af6

  • SHA512

    0cca0f0e1f1fae77eba6f438ce53c9542811533d9015a24bebaf4fce4ba936a7642c51f25bec74171e60591f10d8bdf7f76e8e49f27e640209b81bdfcfcbda01

  • SSDEEP

    6291456:hVqIbo0MM0kYOnyEBVToKg+IKiwA4kB88xU+WDyb/B/22aMBb7WDnexkq50NguO2:6Is0XRBV3LR4B8vm/hqMdWLeW00NgBa

Malware Config

Targets

    • Target

      Passware Kit Forensic 2021 Pre-patched retail installer.exe

    • Size

      381.5MB

    • MD5

      298faa0669e7d439d1ba4a3d641cc619

    • SHA1

      093f271f3c1b4b6e6b948ee61b01ac2c7c02a0fd

    • SHA256

      344b9876db6b8649b9d65448a715b1923011ea9146e116908eb4d35bd8fa3af6

    • SHA512

      0cca0f0e1f1fae77eba6f438ce53c9542811533d9015a24bebaf4fce4ba936a7642c51f25bec74171e60591f10d8bdf7f76e8e49f27e640209b81bdfcfcbda01

    • SSDEEP

      6291456:hVqIbo0MM0kYOnyEBVToKg+IKiwA4kB88xU+WDyb/B/22aMBb7WDnexkq50NguO2:6Is0XRBV3LR4B8vm/hqMdWLeW00NgBa

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Stops running service(s)

    • System Binary Proxy Execution: Regsvcs/Regasm

      Abuse Regasm to proxy execution of malicious code.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks