Resubmissions

15/02/2023, 01:58

230215-cd5xgahb3t 10

15/02/2023, 01:39

230215-b23atahe29 10

15/02/2023, 01:34

230215-bzerqshd86 10

General

  • Target

    http://ttwweatterarartgea.ga

  • Sample

    230215-b23atahe29

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

Office04

C2

192.168.1.237:1290

Mutex

0cdb9102-24f8-4ed6-ba0c-d7625d69d684

Attributes
  • encryption_key

    63E6BFBD5330A53154091A63A8847C4FAA484D23

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    2899

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      http://ttwweatterarartgea.ga

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks