General

  • Target

    382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3

  • Size

    337KB

  • Sample

    220625-zvgyaseac3

  • MD5

    8674e8fd878a92e92a479b931235bb72

  • SHA1

    dfc652402b4791b81379326b0881cd0a2e613169

  • SHA256

    382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3

  • SHA512

    6d36b398d1f964b3b2f0ce5fdd1a0a04e7997b8fa8295912f31d4e26a50dee75197303df34d92915fa5bb57a5df4d486dcff7d312bd5064425cd27218b4e094c

Malware Config

Extracted

Family

quasar

Version

1.4.0.0

Botnet

CEO

C2

23.249.161.211:1714

Mutex

ymuFePGjPK2s7dyOvO

Attributes
  • encryption_key

    H5mirEGEuwM1G7u6Z7Pb

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3

    • Size

      337KB

    • MD5

      8674e8fd878a92e92a479b931235bb72

    • SHA1

      dfc652402b4791b81379326b0881cd0a2e613169

    • SHA256

      382204c078672bfae8b2c7f123e7cd735c3dd428f49446817973820cb0f2e5e3

    • SHA512

      6d36b398d1f964b3b2f0ce5fdd1a0a04e7997b8fa8295912f31d4e26a50dee75197303df34d92915fa5bb57a5df4d486dcff7d312bd5064425cd27218b4e094c

    • Quasar Payload

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • suricata: ET MALWARE Common RAT Connectivity Check Observed

      suricata: ET MALWARE Common RAT Connectivity Check Observed

    • Drops startup file

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks