General
-
Target
f74eafefa6ec7e1e110e4a2dd78054e9.bin
-
Size
1.2MB
-
Sample
250511-ccb8rsvqy6
-
MD5
66857d56e0ec7639ed855584cf1746b5
-
SHA1
168c6a88a6d2802ff6d3de5ca702dd19a1e37ee5
-
SHA256
94f07091019bd2d1e3c1b86deefeb28c9a2c91cea8a8070974c04459ce4ea9d1
-
SHA512
e9d1280914427c66821c1d680a215975dc9d1759136523c2ae488524cd03891af2d068caebbe5d325ce464a758acc33912d44fa7c5bd286e2975b9ef8fc619f0
-
SSDEEP
24576:SzK7FUYU4/hCBAYAH+rxZqNooQieX8XIDyTvrJYyeYh6MbLHVrFAwwa:lz/UAH+KQipXGIFYFYhQwwa
Behavioral task
behavioral1
Sample
fc21892aeb3c146f92a5721115252b5924c70494ae24460aa1d72c986aee2a36.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
fc21892aeb3c146f92a5721115252b5924c70494ae24460aa1d72c986aee2a36.exe
Resource
win11-20250502-en
Malware Config
Extracted
quasar
1.4.1
Office04
213.209.150.210:8883
5ae9d9d1-c102-422b-846d-85bceea00d83
-
encryption_key
5BCC3F93A18E5423C76CAF27F43E3B9CD95C7C28
-
install_name
Client.exe
-
key_salt
bfeb1e56fbcd973bb219022430a57843003d5644d21e62b9d4f180e7e6c33941
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Upo
-
subdirectory
SubDir
Extracted
vidar
13.6
158fdd2a4f5abb978509580715e5353f
https://t.me/m00f3r
https://steamcommunity.com/profiles/76561199851454339
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
213.209.150.210:7773
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Extracted
lumma
https://araucahkbm.live/baneb
https://flowerexju.bet/lanz
https://zmedtipp.live/mnvzx
https://easterxeen.run/zavc
https://overcovtcg.top/juhd
https://blackswmxc.top/bgry
https://posseswsnc.top/akds
https://1featurlyin.top/pdal
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
213.209.150.210:8882
124ijgjsda8d19s
-
delay
1
-
install
true
-
install_file
Riot Games.exe
-
install_folder
%AppData%
Targets
-
-
Target
fc21892aeb3c146f92a5721115252b5924c70494ae24460aa1d72c986aee2a36.exe
-
Size
3.1MB
-
MD5
f74eafefa6ec7e1e110e4a2dd78054e9
-
SHA1
749ec2465671de48c0ba76732773a29c1a678d3b
-
SHA256
fc21892aeb3c146f92a5721115252b5924c70494ae24460aa1d72c986aee2a36
-
SHA512
8cdd0ed58955d64b0c749062d8f0e5fc0dec4ebed9f734193eb68681d2ab4064d0b753eafec72d91ec1e877eb47bd9e29fa9fe84e1cdae0104c40ef5cbd2b766
-
SSDEEP
49152:WvFt62XlaSFNWPjljiFa2RoUYIXe8UbR4LoGdXTHHB72eh2NT:Wv362XlaSFNWPjljiFXRoUYIXe8b
-
Asyncrat family
-
Detect Vidar Stealer
-
Lumma family
-
Njrat family
-
Quasar family
-
Quasar payload
-
Vidar family
-
Async RAT payload
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Persistence
Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2