General
-
Target
bannas.exe
-
Size
348KB
-
Sample
241214-y6rffatjat
-
MD5
7500a9269a35b159e854312282732728
-
SHA1
5b3d03a59af9e662f84fb2ab113e6275a9d502af
-
SHA256
8b776eb44e02df10fec47058feac9cc18d0f169370ebf7cbd9f0f0b7b66c99f9
-
SHA512
3d46a5cec0dfc5b14381e21c096d0a9d094e6971629eada7fa4a3ddac7ac2192ff69c1c73b627447092d6589caab350fea14235cfbb380a364dba14969a7487f
-
SSDEEP
6144:wk+zrEsiN1PDA3COn7bblr71T2fJYUzsgNkd:dxsiNczZsf2UzXkd
Behavioral task
behavioral1
Sample
bannas.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.3.0.0
Office04
localhost:4781
192.168.1.159:4781
skibiditoilet.hopto.org:4781
86.175.70.140:4781
QSR_MUTEX_86QM62MaEKfEyd8OVt
-
encryption_key
zZvCiezIyCBIqqTBUeKo
-
install_name
security2.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
security2
-
subdirectory
skibidi
Targets
-
-
Target
bannas.exe
-
Size
348KB
-
MD5
7500a9269a35b159e854312282732728
-
SHA1
5b3d03a59af9e662f84fb2ab113e6275a9d502af
-
SHA256
8b776eb44e02df10fec47058feac9cc18d0f169370ebf7cbd9f0f0b7b66c99f9
-
SHA512
3d46a5cec0dfc5b14381e21c096d0a9d094e6971629eada7fa4a3ddac7ac2192ff69c1c73b627447092d6589caab350fea14235cfbb380a364dba14969a7487f
-
SSDEEP
6144:wk+zrEsiN1PDA3COn7bblr71T2fJYUzsgNkd:dxsiNczZsf2UzXkd
-
Quasar family
-
Quasar payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1