General
-
Target
Xidrf-gen.zip
-
Size
63.2MB
-
Sample
250107-xend2avqfm
-
MD5
0266aa8ca1f0cfa75a5a16a1c57af296
-
SHA1
60877a6ab03279b2afd77dfa0566fd9c0f605da7
-
SHA256
c56b66a485a26d6a815e6fd6d5adb7abb6a2d1c001aae3a569a76b9ffa54b735
-
SHA512
6911861ff514fbef9bf785cabff0ccc3b2b08e8feadfacdef0406938de422859ece1d9fa64f54e8ebe477726df688c304136722a62983a6a471c0edf74cb4f7e
-
SSDEEP
1572864:BIGssbOjOvps4Sea/AU03s9SvL07pyMS1Cg:KN+ps4SeaYU03aSv9MS1Cg
Static task
static1
Behavioral task
behavioral1
Sample
Xidrf-gen.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Xidrf-gen.zip
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
2.1.0.0
XIDRF
127.0.0.1:4782
VNM_MUTEX_rWPgR9AdzybeX9Wvul
-
encryption_key
fwVX0Jp4fmwwdCkH27Fm
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Window Startup
-
subdirectory
SubDir
Targets
-
-
Target
Xidrf-gen.zip
-
Size
63.2MB
-
MD5
0266aa8ca1f0cfa75a5a16a1c57af296
-
SHA1
60877a6ab03279b2afd77dfa0566fd9c0f605da7
-
SHA256
c56b66a485a26d6a815e6fd6d5adb7abb6a2d1c001aae3a569a76b9ffa54b735
-
SHA512
6911861ff514fbef9bf785cabff0ccc3b2b08e8feadfacdef0406938de422859ece1d9fa64f54e8ebe477726df688c304136722a62983a6a471c0edf74cb4f7e
-
SSDEEP
1572864:BIGssbOjOvps4Sea/AU03s9SvL07pyMS1Cg:KN+ps4SeaYU03aSv9MS1Cg
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Quasar family
-
Quasar payload
-
Venomrat family
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-