General
-
Target
applecleaner (1).exe
-
Size
6.7MB
-
Sample
250103-3l17cszjb1
-
MD5
cad8354da177706b2d48dd9d0642d9f0
-
SHA1
ea69a1e3cf00894543bb40f5ee4251439e3b2252
-
SHA256
62fc499b88eeb0334509ede6bba0f67dcdce5eb7954e5cbd2adfaabc0e2d405e
-
SHA512
f9dc85730ee4e729358a9acf3d5ace4aa146f16736dd368308c2feb4ee876d0a60b586907aa556ea357459eeb2c678451667ae4bb5dee3e94c2ca39719945f78
-
SSDEEP
196608:3pm+PJQbtnYGscd8rQcDw9Le+3L+cES9SDI:3pm2MnYG96jR+3LM
Static task
static1
Behavioral task
behavioral1
Sample
applecleaner (1).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
applecleaner (1).exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
applecleaner (1).exe
Resource
win11-20241007-en
Malware Config
Extracted
quasar
1.4.1
retigga
192.168.1.90:4782
a44d3f31-890a-4898-b165-c2376c429bdc
-
encryption_key
44D22D01383E73D0D2E9F33669A5C563ECE6903D
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
applecleaner (1).exe
-
Size
6.7MB
-
MD5
cad8354da177706b2d48dd9d0642d9f0
-
SHA1
ea69a1e3cf00894543bb40f5ee4251439e3b2252
-
SHA256
62fc499b88eeb0334509ede6bba0f67dcdce5eb7954e5cbd2adfaabc0e2d405e
-
SHA512
f9dc85730ee4e729358a9acf3d5ace4aa146f16736dd368308c2feb4ee876d0a60b586907aa556ea357459eeb2c678451667ae4bb5dee3e94c2ca39719945f78
-
SSDEEP
196608:3pm+PJQbtnYGscd8rQcDw9Le+3L+cES9SDI:3pm2MnYG96jR+3LM
-
Quasar family
-
Quasar payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Modifies Windows Firewall
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Obfuscated Files or Information
1Command Obfuscation
1Virtualization/Sandbox Evasion
1Discovery
Browser Information Discovery
1Network Service Discovery
1Query Registry
6System Information Discovery
7System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
1