General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
quasar
2.1.0.0
C
sunday-n.gl.at.ply.gg:45214
VNM_MUTEX_JOaTNk0VrI3HINWRTc
-
encryption_key
BVfQN2TWXpz6KPjx5tNq
-
install_name
V.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
V
-
subdirectory
SubDir
Targets
-
-
Target
http://gofile.io/d/Hbsz20
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Modifies Windows Defender Real-time Protection settings
-
Quasar family
-
Quasar payload
-
Venomrat family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Windows security modification
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
3Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1