General
-
Target
Compiled-Fix
-
Size
172KB
-
Sample
241223-srk28atjbs
-
MD5
be9d218d604d1a8d3babaaf1f2d15a3a
-
SHA1
c4506665acb7ca2f8b0b703000145a5565fde0e3
-
SHA256
5d81121b6369105d2886f975f4b8ed3aeed03551f470c1edd464957d9ba63a89
-
SHA512
97a3d447af1ac79370677ae6c836a4c4f705f2488392cbe1d6ef218e2391e62707886f6051f05204972a86227cdcbfa4565b5fe69eac4b7e85142550b574b068
-
SSDEEP
3072:oVz7eznSahQHZ2AGSEZbOh4nczkmYUNF+rteS9V1PHMvxgZNs9V1PHMv4epApOLp:msNxApOL/saqkPV9FemLtcIDSsmwH9Xt
Static task
static1
Behavioral task
behavioral1
Sample
Compiled-Fix
Resource
win11-20241007-en
Malware Config
Extracted
https://pastebin.com/raw/zaCgrR02
Extracted
quasar
1.4.0
v15.4.1 | Venom
dofucks.com:12482
private115.duckdns.org:12482
adf10731-c83d-4166-9137-39d0b1e48856
-
encryption_key
C84CB6134701741C5122A14FACDB67C8CFA9C0AB
-
install_name
.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
$sxr-seroxen
Extracted
asyncrat
5.0.5
Venom Clients
127.0.0.1:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
dwad.exe
-
install_folder
%AppData%
Targets
-
-
Target
Compiled-Fix
-
Size
172KB
-
MD5
be9d218d604d1a8d3babaaf1f2d15a3a
-
SHA1
c4506665acb7ca2f8b0b703000145a5565fde0e3
-
SHA256
5d81121b6369105d2886f975f4b8ed3aeed03551f470c1edd464957d9ba63a89
-
SHA512
97a3d447af1ac79370677ae6c836a4c4f705f2488392cbe1d6ef218e2391e62707886f6051f05204972a86227cdcbfa4565b5fe69eac4b7e85142550b574b068
-
SSDEEP
3072:oVz7eznSahQHZ2AGSEZbOh4nczkmYUNF+rteS9V1PHMvxgZNs9V1PHMv4epApOLp:msNxApOL/saqkPV9FemLtcIDSsmwH9Xt
-
Asyncrat family
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Blocklisted process makes network request
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Legitimate hosting services abused for malware hosting/C2
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
1Hidden Window
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1