General
-
Target
Downloads.exe
-
Size
1.6MB
-
Sample
250331-qmqe2atjt5
-
MD5
1e356cc44d9fafcd633b2e372a46ad53
-
SHA1
0d0a32521cad4cb38dc3c841a486ed21a5454943
-
SHA256
a729ddb411ab2f5a818be693d12b245215e5eb6ea79fad2fa87d85ea3e2cf683
-
SHA512
91fa09c5be7543cbd4356370b2059521dc7ae2a47462f5871427a1ad5448249c9bf1e384c58c0966227a85574c913c09b9cff62f5bcae36ada9e8695b94e47cd
-
SSDEEP
24576:jngHKYfXTkXy0Z0UplCOlyyXEwlKhgoCY9X8jOlC3rocE/0sED5cHD:zgqKIXzryOMoBlKRCgvA5M
Static task
static1
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/YOUR_WEBHOOK_ID/YOUR_WEBHOOK_TOKEN
Extracted
quasar
1.4.1
Office04
102.41.58.213:5505
1e97a2db-0622-4c39-84ac-2f640c70aaf5
-
encryption_key
1F6CCF154B4C85A58D675CA9A482E9C7A041C879
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Extracted
asyncrat
0.5.8
Default
197.48.105.157:5505
41.233.14.164:5505
197.48.230.161:5505
102.41.58.213:5505
RW4mawavalFO
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Targets
-
-
Target
Downloads.exe
-
Size
1.6MB
-
MD5
1e356cc44d9fafcd633b2e372a46ad53
-
SHA1
0d0a32521cad4cb38dc3c841a486ed21a5454943
-
SHA256
a729ddb411ab2f5a818be693d12b245215e5eb6ea79fad2fa87d85ea3e2cf683
-
SHA512
91fa09c5be7543cbd4356370b2059521dc7ae2a47462f5871427a1ad5448249c9bf1e384c58c0966227a85574c913c09b9cff62f5bcae36ada9e8695b94e47cd
-
SSDEEP
24576:jngHKYfXTkXy0Z0UplCOlyyXEwlKhgoCY9X8jOlC3rocE/0sED5cHD:zgqKIXzryOMoBlKRCgvA5M
-
Asyncrat family
-
Detect Umbral payload
-
Quasar family
-
Quasar payload
-
Umbral family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-