General
-
Target
RonixBuild.rar
-
Size
32.6MB
-
Sample
250118-xsv12asmcl
-
MD5
fcb8ce41aa00cd3a26ef6f2c637311fa
-
SHA1
fa1167f818f7c04eadb2a3257bfbfc1076c0028e
-
SHA256
0a6345d0ff7553fe209f1f52818faa5b67736bee6ab92c862d70b79132a3688f
-
SHA512
fc6bf51a74255de0ce7b0cd00ab330da706e085145789437841a465f17a3e6696a0570a2696d46a077cbe1b5c21f56b6186c8a89d2f32a7211418e3fcc9e050c
-
SSDEEP
786432:etrwXxz4P/7DkQ8u4h1eRS94F3CDYiILZhv38ySKn:Gme7wbPiV/iMUyvn
Static task
static1
Behavioral task
behavioral1
Sample
RonixBuild.rar
Resource
win11-20241007-en
Malware Config
Extracted
quasar
1.4.0.0
Office
94.156.227.243:2525
oTxrlqdwPMOLsmyvNDhfnghfghfdghdhgdf
-
encryption_key
OrbWCBlfA6bm8c9kCViO
-
install_name
csrss.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
NET framework
-
subdirectory
SubDir
Targets
-
-
Target
RonixBuild.rar
-
Size
32.6MB
-
MD5
fcb8ce41aa00cd3a26ef6f2c637311fa
-
SHA1
fa1167f818f7c04eadb2a3257bfbfc1076c0028e
-
SHA256
0a6345d0ff7553fe209f1f52818faa5b67736bee6ab92c862d70b79132a3688f
-
SHA512
fc6bf51a74255de0ce7b0cd00ab330da706e085145789437841a465f17a3e6696a0570a2696d46a077cbe1b5c21f56b6186c8a89d2f32a7211418e3fcc9e050c
-
SSDEEP
786432:etrwXxz4P/7DkQ8u4h1eRS94F3CDYiILZhv38ySKn:Gme7wbPiV/iMUyvn
-
Modifies WinLogon for persistence
-
Quasar family
-
Quasar payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Disables RegEdit via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5Subvert Trust Controls
1SIP and Trust Provider Hijacking
1