Overview
overview
10Static
static
3Dox Tool V...ed.exe
windows7-x64
10Dox Tool V...ed.exe
windows10-2004-x64
10Dox Tool V...on.dll
windows7-x64
1Dox Tool V...on.dll
windows10-2004-x64
1Dox Tool V...I2.dll
windows10-2004-x64
3Dox Tool V...ct.dll
windows7-x64
1Dox Tool V...ct.dll
windows10-2004-x64
1Dox Tool V...ip.dll
windows7-x64
1Dox Tool V...ip.dll
windows10-2004-x64
1Dox Tool V...er.exe
windows7-x64
8Dox Tool V...er.exe
windows10-2004-x64
8Dox Tool V...on.dll
windows7-x64
1Dox Tool V...on.dll
windows10-2004-x64
1Dox Tool V...I2.dll
windows10-2004-x64
3Dox Tool V...ct.dll
windows7-x64
1Dox Tool V...ct.dll
windows10-2004-x64
1Dox Tool V...ys.exe
windows7-x64
10Dox Tool V...ys.exe
windows10-2004-x64
10General
-
Target
Dox Tool V3 Cracked.rar
-
Size
1.6MB
-
Sample
241207-2rmeqatlak
-
MD5
a80d21cb7ec32c7b82b02186fb6e7751
-
SHA1
bdad4f5b2eaeaa763710bb10aff89215c3321474
-
SHA256
e4bdfc5dee2559aba73e88fa3c0185821d328a1ead618e578352623687fa9ae7
-
SHA512
d658f889912ba79b1155096148681e9bffa726743cdad9178bb3004785433f1ed74fbc18016556120ed03cdd49632ce495762a700fe8cec349156ecc5638544e
-
SSDEEP
49152:+C8NlxWSwOcsNlkAfTqNZZUakzfTqNNZBe:F8Nl8STAA7yZUx7iZBe
Static task
static1
Behavioral task
behavioral1
Sample
Dox Tool V3 Cracked/Dox Tool V3 Cracked.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Dox Tool V3 Cracked/Dox Tool V3 Cracked.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Dox Tool V3 Cracked/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Dox Tool V3 Cracked/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Dox Tool V3 Cracked/Search.ProtocolHandler.MAPI2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
Dox Tool V3 Cracked/Tesseract.dll
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
Dox Tool V3 Cracked/Tesseract.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
Dox Tool V3 Cracked/data/Ionic.Zip.dll
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
Dox Tool V3 Cracked/data/Ionic.Zip.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
Dox Tool V3 Cracked/data/Launcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
Dox Tool V3 Cracked/data/Launcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
Dox Tool V3 Cracked/data/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
Dox Tool V3 Cracked/data/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
Dox Tool V3 Cracked/data/Search.ProtocolHandler.MAPI2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Dox Tool V3 Cracked/data/Tesseract.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Dox Tool V3 Cracked/data/Tesseract.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Dox Tool V3 Cracked/data/doxsys.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.3.0.0
Office04
192.168.1.11:4782
QSR_MUTEX_f39lWqYnYtP5YngtM5
-
encryption_key
c5q7P5jsfrwN6nB5c3mG
-
install_name
SystemUpdate.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
WindowsUpdate
-
subdirectory
SubDir
Targets
-
-
Target
Dox Tool V3 Cracked/Dox Tool V3 Cracked.exe
-
Size
207KB
-
MD5
6c206cadf297a02c0af977c65637a166
-
SHA1
7d382b1e6cefd120f9d87f894e14088e18d01c73
-
SHA256
f4f78f44719af71a363bd50107840f53f8eebf3190505c10bac2cf7be3c29e59
-
SHA512
2672ae02fb6b768861f469556f9818fd84866d62122f243309b5f2d13c4c907b6555e968bfb4b10cd48188fe3b2182b15ee7f425ddd14835b483d0dfe721b515
-
SSDEEP
3072:a4lci2Fg23Ii0qLTqBGsx/2JNRnvcXCevyLNgtlr:a6ci8giNLZW2HRnvKClg
-
Quasar family
-
Quasar payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
-
-
Target
Dox Tool V3 Cracked/Newtonsoft.Json.dll
-
Size
659KB
-
MD5
4df6c8781e70c3a4912b5be796e6d337
-
SHA1
cbc510520fcd85dbc1c82b02e82040702aca9b79
-
SHA256
3598cccad5b535fea6f93662107a4183bfd6167bf1d0f80260436093edc2e3af
-
SHA512
964d9813e4d11e1e603e0a9627885c52034b088d0b0dfa5ac0043c27df204e621a2a654445f440ae318e15b1c5fea5c469da9e6a7350a787fef9edf6f0418e5c
-
SSDEEP
12288:rktg1lrjC8rjICqbwNjR4xq7iiX19K7Df/SoOKQrIB+jfP:rggD7PIEjR4xq7iiXTK7D3So9AIB+jn
Score1/10 -
-
-
Target
Dox Tool V3 Cracked/Search.ProtocolHandler.MAPI2.dll
-
Size
276KB
-
MD5
1eff11ced2866665f101892e9d097d14
-
SHA1
3aeec6fb969b0036c6f940db4ce1e63bde607518
-
SHA256
a90c1a13965f534565f98b4a7c0de5804b35482e9668f3d60df8a1c039e51ad9
-
SHA512
4c1b8423f5c43f1676e9625af0ada601e19283744992c148c0f8e79bff655c56e694a866da9fa3eab178c231457d30d371e5b469045a45d26814937bbc171fd9
-
SSDEEP
6144:5RFuPQsVHJ+gQEBTjsX1X503HjXZIEbBdkB80NcJSTxVhDWW3W6NBKxCf+G1q:cQb1X5+HxdkB80Nc0VhDWWmW8
Score3/10 -
-
-
Target
Dox Tool V3 Cracked/Tesseract.dll
-
Size
122KB
-
MD5
8eef5f1c4e31c2b9a240a906d87ac0c4
-
SHA1
d7727a01aba3a5fa71338ef1287575ce64e6cdb4
-
SHA256
118c10d00e5b366cdef45e334ff928513a3c6e1f55d19deb3a1527796c5ca3b4
-
SHA512
c94b376147b60e09c931440f956466255731fe5dbe021f53a30b6f0a63506f5ad1b834b96ffa38828797f0536ea13c1ae10911cffee1ba485aa3455acff4953d
-
SSDEEP
3072:RJb7xI+LGb4Whk/u+j5qvzpTKTzEeECjSh56q0m:TH+UGdAu+FB
Score1/10 -
-
-
Target
Dox Tool V3 Cracked/data/Ionic.Zip.dll
-
Size
480KB
-
MD5
f6933bf7cee0fd6c80cdf207ff15a523
-
SHA1
039eeb1169e1defe387c7d4ca4021bce9d11786d
-
SHA256
17bb0c9be45289a2be56a5f5a68ec9891d7792b886e0054bc86d57fe84d01c89
-
SHA512
88675512daa41e17ce4daf6ca764ccb17cd9633a7c2b7545875089cae60f6918909a947f3b1692d16ec5fa209e18e84bc0ff3594f72c3e677a6cca9f3a70b8d6
-
SSDEEP
6144:OhagC/Mq25o9sXGtSV41OJDsTDDVUMle6ZjxLV/kHu4Bht79I9:iagxWS4msNUCe65fkHdBf9
Score1/10 -
-
-
Target
Dox Tool V3 Cracked/data/Launcher.exe
-
Size
53KB
-
MD5
c6d4c881112022eb30725978ecd7c6ec
-
SHA1
ba4f96dc374195d873b3eebdb28b633d9a1c5bf5
-
SHA256
0d87b9b141a592711c52e7409ec64de3ab296cddc890be761d9af57cea381b32
-
SHA512
3bece10b65dfda69b6defbf50d067a59d1cd1db403547fdf28a4cbc87c4985a4636acfcff8300bd77fb91f2693084634d940a91517c33b5425258835ab990981
-
SSDEEP
768:FKtnBTTQi/YqMFlVt52ftDhKeoNzZq8OujxUu5XEAb4b9yvMzUV5:qBTUgYFveDRuFEAb4b99QV5
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
Dox Tool V3 Cracked/data/Newtonsoft.Json.dll
-
Size
659KB
-
MD5
4df6c8781e70c3a4912b5be796e6d337
-
SHA1
cbc510520fcd85dbc1c82b02e82040702aca9b79
-
SHA256
3598cccad5b535fea6f93662107a4183bfd6167bf1d0f80260436093edc2e3af
-
SHA512
964d9813e4d11e1e603e0a9627885c52034b088d0b0dfa5ac0043c27df204e621a2a654445f440ae318e15b1c5fea5c469da9e6a7350a787fef9edf6f0418e5c
-
SSDEEP
12288:rktg1lrjC8rjICqbwNjR4xq7iiX19K7Df/SoOKQrIB+jfP:rggD7PIEjR4xq7iiXTK7D3So9AIB+jn
Score1/10 -
-
-
Target
Dox Tool V3 Cracked/data/Search.ProtocolHandler.MAPI2.dll
-
Size
276KB
-
MD5
1eff11ced2866665f101892e9d097d14
-
SHA1
3aeec6fb969b0036c6f940db4ce1e63bde607518
-
SHA256
a90c1a13965f534565f98b4a7c0de5804b35482e9668f3d60df8a1c039e51ad9
-
SHA512
4c1b8423f5c43f1676e9625af0ada601e19283744992c148c0f8e79bff655c56e694a866da9fa3eab178c231457d30d371e5b469045a45d26814937bbc171fd9
-
SSDEEP
6144:5RFuPQsVHJ+gQEBTjsX1X503HjXZIEbBdkB80NcJSTxVhDWW3W6NBKxCf+G1q:cQb1X5+HxdkB80Nc0VhDWWmW8
Score3/10 -
-
-
Target
Dox Tool V3 Cracked/data/Tesseract.dll
-
Size
122KB
-
MD5
8eef5f1c4e31c2b9a240a906d87ac0c4
-
SHA1
d7727a01aba3a5fa71338ef1287575ce64e6cdb4
-
SHA256
118c10d00e5b366cdef45e334ff928513a3c6e1f55d19deb3a1527796c5ca3b4
-
SHA512
c94b376147b60e09c931440f956466255731fe5dbe021f53a30b6f0a63506f5ad1b834b96ffa38828797f0536ea13c1ae10911cffee1ba485aa3455acff4953d
-
SSDEEP
3072:RJb7xI+LGb4Whk/u+j5qvzpTKTzEeECjSh56q0m:TH+UGdAu+FB
Score1/10 -
-
-
Target
Dox Tool V3 Cracked/data/doxsys.exe
-
Size
1.0MB
-
MD5
8f36caf603f3f2b192c5fd06a8e3c699
-
SHA1
44f387152ee1fb02a83ed0be5e942fd4a733e235
-
SHA256
0ca828c630091173cafd2663393888849459fbc9581d1fd062567d0afdf79a38
-
SHA512
9df012c7420a4f6224907a8ac1e3293985b30c9ff829ecc9cdeea56fdcaa1c46d8e131fdd9b525e6af092065a29401c11f24390ba30969e9f3ab7e60e094dcba
-
SSDEEP
12288:GNTWV+v54B9H+hyf2SF6L6D5hKMzPg9e0oEPABi:GWVa4bHwkSYa4gk0omA
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1