General

  • Target

    b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4

  • Size

    927KB

  • Sample

    220415-kqlncshah5

  • MD5

    d9f78b702ec7fd8a246103fe2eae5704

  • SHA1

    90617fe3b2a7c71e6531eaa6b602c3ef86b3237d

  • SHA256

    b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4

  • SHA512

    1be56e8d51aa911acf2159ab9c04ae98b3bd7ee5e28a295d20f23b6918bf005d2e45314ae01dccce404e93f7146dd7b2d5b1b4119674560eab52e3a23f2f8aad

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

Office04

C2

127.0.0.1:4782

Mutex

936e6e55-d8a2-4cdc-a725-acb9291b9b7e

Attributes
  • encryption_key

    627F681A7B8A3EA1E3B1DB478CE6E95260D73355

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4

    • Size

      927KB

    • MD5

      d9f78b702ec7fd8a246103fe2eae5704

    • SHA1

      90617fe3b2a7c71e6531eaa6b602c3ef86b3237d

    • SHA256

      b75e201244597308d908a3464c0df0f99c27eb360c5851fcd0ca100c23115df4

    • SHA512

      1be56e8d51aa911acf2159ab9c04ae98b3bd7ee5e28a295d20f23b6918bf005d2e45314ae01dccce404e93f7146dd7b2d5b1b4119674560eab52e3a23f2f8aad

    • Meta Stealer Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • Quasar Payload

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Looks for VirtualBox Guest Additions in registry

    • Executes dropped EXE

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks