General

  • Target

    mouse

  • Size

    679KB

  • Sample

    201109-kfaxvcf6xn

  • MD5

    c650cb14934aa96f98034b617b054f71

  • SHA1

    f63eaef9965425612ed33aa28598e493099071e2

  • SHA256

    01f148ef47dccb8c73a46f64e849f1249915dc5cf4423b9cc4690ad303a70fd9

  • SHA512

    160d7ce2f48497198b1e51f039cb808b7878ec6227cc19cc5996a0eb69cd8fc100b7a63a2ef9a919c5bf64c937dadb7bbcce87095172bf6c8d6cfa2ca594640f

Malware Config

Targets

    • Target

      mouse

    • Size

      679KB

    • MD5

      c650cb14934aa96f98034b617b054f71

    • SHA1

      f63eaef9965425612ed33aa28598e493099071e2

    • SHA256

      01f148ef47dccb8c73a46f64e849f1249915dc5cf4423b9cc4690ad303a70fd9

    • SHA512

      160d7ce2f48497198b1e51f039cb808b7878ec6227cc19cc5996a0eb69cd8fc100b7a63a2ef9a919c5bf64c937dadb7bbcce87095172bf6c8d6cfa2ca594640f

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • rezer0

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Initial Access

Replication Through Removable Media

1
T1091

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Lateral Movement

Replication Through Removable Media

1
T1091

Tasks