General
-
Target
sussy vercelapp 1txt.zip
-
Size
62.5MB
-
Sample
250105-ykv7hawpbp
-
MD5
ce4d9569d01468130da991fd3943b718
-
SHA1
c397c3e0dd802a6dd87f243f1735eafef76048e2
-
SHA256
319dacd3daf1eb80003f9cf78d1297e6a07c19e1e9382e8fbc070e9e6fd805e2
-
SHA512
c8c127bc3389d09f776fd4da28dfb7b65b73a391bba1c058954771988949726f54c2c79d99ce611a8957b4ed15d6b7707d896815b5cf965617395c73d89a7778
-
SSDEEP
1572864:Rdz+VBzlb5zcEnaOJ38wTvIq8Gn7IHYsSG:RhQrb5IOF8wTvVPUHpSG
Static task
static1
Behavioral task
behavioral1
Sample
sussy vercelapp 1txt.zip
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
-
encryption_key
1162A0E173FED8E7CF598896A547E279E681EE6F
-
reconnect_delay
3000
Targets
-
-
Target
sussy vercelapp 1txt.zip
-
Size
62.5MB
-
MD5
ce4d9569d01468130da991fd3943b718
-
SHA1
c397c3e0dd802a6dd87f243f1735eafef76048e2
-
SHA256
319dacd3daf1eb80003f9cf78d1297e6a07c19e1e9382e8fbc070e9e6fd805e2
-
SHA512
c8c127bc3389d09f776fd4da28dfb7b65b73a391bba1c058954771988949726f54c2c79d99ce611a8957b4ed15d6b7707d896815b5cf965617395c73d89a7778
-
SSDEEP
1572864:Rdz+VBzlb5zcEnaOJ38wTvIq8Gn7IHYsSG:RhQrb5IOF8wTvVPUHpSG
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks for common network interception software
Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Authentication Process
1Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2