General

  • Target

    FINAL.exe

  • Size

    13.2MB

  • Sample

    221217-cft8raah3y

  • MD5

    8c9180cfa2862e68b9beaf9b9e14a1c2

  • SHA1

    09011f6b0b5d48e9bb61e65f10872fe4b344f66a

  • SHA256

    b8e6b01b8e7598bd8b01bedfe1232eb936a12f852a90a3a545bc2af7e4667c43

  • SHA512

    4657b171e3594370a8c9086bd2436b5ec7deaba73975856baafce4391582c6ce45d0820922706e0de3346bb85ffe8854fe419baa88a6cca83b94d67214bdf6c3

  • SSDEEP

    196608:7+ww4z5xjkyIte8YHX0QoLPT7M18ZKhib/sV83V+Uj3iI9NeTA4cxXD4JF:7+x4FSyI88Ekprw1/f8R3roTAY

Malware Config

Extracted

Family

quasar

Version

1.4.0.0

Botnet

windowsfirewall

C2

xmarvel.ddns.net:4782

2.58.56.188:4782

Mutex

hMAbT9pppBWPnLDPSK

Attributes
  • encryption_key

    iZ94RsK8uKM1BvRnYlBk

  • install_name

    wfmsc.exe

  • log_directory

    Logs

  • reconnect_delay

    1

  • startup_key

    windowsdefender

  • subdirectory

    windowsfirewall

Extracted

Family

limerat

Attributes
  • aes_key

    key

  • antivm

    false

  • c2_url

    https://pastebin.com/raw/nW4J6TiP

  • delay

    3

  • download_payload

    false

  • install

    true

  • install_name

    windowsdefender.exe

  • main_folder

    UserProfile

  • pin_spread

    true

  • sub_folder

    \wd\

  • usb_spread

    true

Targets

    • Target

      FINAL.exe

    • Size

      13.2MB

    • MD5

      8c9180cfa2862e68b9beaf9b9e14a1c2

    • SHA1

      09011f6b0b5d48e9bb61e65f10872fe4b344f66a

    • SHA256

      b8e6b01b8e7598bd8b01bedfe1232eb936a12f852a90a3a545bc2af7e4667c43

    • SHA512

      4657b171e3594370a8c9086bd2436b5ec7deaba73975856baafce4391582c6ce45d0820922706e0de3346bb85ffe8854fe419baa88a6cca83b94d67214bdf6c3

    • SSDEEP

      196608:7+ww4z5xjkyIte8YHX0QoLPT7M18ZKhib/sV83V+Uj3iI9NeTA4cxXD4JF:7+x4FSyI88Ekprw1/f8R3roTAY

    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Nirsoft

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scripting

1
T1064

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Scripting

1
T1064

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

4
T1082

Process Discovery

1
T1057

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Impact

Defacement

1
T1491

Tasks