General

  • Target

    dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995

  • Size

    763KB

  • Sample

    220731-kpqwpahggk

  • MD5

    0cd6977068202fb2a7b3ab7c552ec508

  • SHA1

    d012374c33fdb7337412c92f7fa4eb9ad2dd2068

  • SHA256

    dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995

  • SHA512

    3a85063893354d7946e3e1a7828592e5319668ce4b732b35376be5039a875d8c1216fd4c823b8d4122f693e5941694fcef382f6ddc1b15c2ba66c63d6c75c2b5

Malware Config

Extracted

Family

quasar

Version

1.4.0.0

Botnet

Slave

C2

167.99.251.51:3693

Mutex

iyE19BRC25gRWkYEfy

Attributes
  • encryption_key

    bbCsAyVHv9b0Y3vfJLN0

  • install_name

    Client.exe

  • log_directory

    Explorer

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995

    • Size

      763KB

    • MD5

      0cd6977068202fb2a7b3ab7c552ec508

    • SHA1

      d012374c33fdb7337412c92f7fa4eb9ad2dd2068

    • SHA256

      dce3b8f6c67292d33c786fe0e92b9df5c63975c5e89a74fe4115defb56c66995

    • SHA512

      3a85063893354d7946e3e1a7828592e5319668ce4b732b35376be5039a875d8c1216fd4c823b8d4122f693e5941694fcef382f6ddc1b15c2ba66c63d6c75c2b5

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks