General
-
Target
ee7f82c8e4206ef5684612a8bb87659e3de3ec3a6360fa4445c6ba7b09555089
-
Size
1.1MB
-
Sample
241217-e3n2cs1qen
-
MD5
0333b88f46c3307fc9f81e49879a713a
-
SHA1
71d9774c6655d70b6bfdde93537ab8a71871f720
-
SHA256
ee7f82c8e4206ef5684612a8bb87659e3de3ec3a6360fa4445c6ba7b09555089
-
SHA512
e58bff9a4bf38298c16c1eeb03dd30308ac83c78bacb6109a8a3323a22266e6b1bd4567baffb361def5942a966314ce1c632f1169a33be321d5dcddc7fd24540
-
SSDEEP
24576:FsZLTFNaRFTbOuOVopBeTy5/9sYfel4nVTGqBJyIkZL:FQLTmTbOJGTmPl4ViNIOL
Static task
static1
Behavioral task
behavioral1
Sample
ee7f82c8e4206ef5684612a8bb87659e3de3ec3a6360fa4445c6ba7b09555089.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee7f82c8e4206ef5684612a8bb87659e3de3ec3a6360fa4445c6ba7b09555089.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
2.1.0.0
Office05
45.202.35.187:7812
VNM_MUTEX_huos54NyApqBwZbqPa
-
encryption_key
KtASenD3qm2g9omdsHwb
-
install_name
Windows Security Service.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Security Update
-
subdirectory
SubDir2
Extracted
xworm
5.0
45.202.35.187:7812
aKdQYeM96lmotCU8
-
Install_directory
%AppData%
-
install_file
svchost.exe
-
telegram
https://api.telegram.org/bot7074211690:AAFHdtGIEk1j3FpHjh6_p8Xjh9rfZDo4uSc/sendMessage?chat_id=6291749148
Extracted
asyncrat
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
https://api.telegram.org/bot7479631857:AAFuIUMNJYKHzJ3Bc9t4FSh9ZQXlqymhFnk/sendMessage?chat_id=6291749148
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
185.252.232.158:7812
64.23.232.116:7812
vsvf
-
delay
1
-
install
true
-
install_file
Windows Security Health Service.exe
-
install_folder
%AppData%
Targets
-
-
Target
ee7f82c8e4206ef5684612a8bb87659e3de3ec3a6360fa4445c6ba7b09555089
-
Size
1.1MB
-
MD5
0333b88f46c3307fc9f81e49879a713a
-
SHA1
71d9774c6655d70b6bfdde93537ab8a71871f720
-
SHA256
ee7f82c8e4206ef5684612a8bb87659e3de3ec3a6360fa4445c6ba7b09555089
-
SHA512
e58bff9a4bf38298c16c1eeb03dd30308ac83c78bacb6109a8a3323a22266e6b1bd4567baffb361def5942a966314ce1c632f1169a33be321d5dcddc7fd24540
-
SSDEEP
24576:FsZLTFNaRFTbOuOVopBeTy5/9sYfel4nVTGqBJyIkZL:FQLTmTbOJGTmPl4ViNIOL
-
Asyncrat family
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Xworm Payload
-
Quasar family
-
Quasar payload
-
StormKitty payload
-
Stormkitty family
-
Venomrat family
-
Xworm family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1