General

  • Target

    Vanta-Fn.exe

  • Size

    3.1MB

  • Sample

    230322-thkwjabf9z

  • MD5

    d41852e4e97ade129efe94cf773d10ff

  • SHA1

    f999477106a8ea6506905abe6effe054c8e3db3b

  • SHA256

    996afa4a4194a60b56825e8589b8cd028cb593f6a619370c15ec04fa2659e500

  • SHA512

    4862f158153d25647901195e6f294bdb1c13ad8ffcaebe000f702f5c1fa49e631b04830baa27e172acf58b1bacbbefb3f99bf6a5d44d90ec21e3b8d9a20ee8cf

  • SSDEEP

    49152:iv4hBYjCO4Dt2d5aKCuVPzlEmVQL0wvwkaGRepECs+k/iLkoGdQTHHB72eh2NT:ivqt2d5aKCuVPzlEmVQ0wvwfGReNg

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

connorb839-25244.portmap.host:25244

Mutex

f2898513-d005-492e-9b72-aa39b77b1a27

Attributes
  • encryption_key

    8CC861C5A1B05D3DCE95956911FE36B8D1042D36

  • install_name

    Epic web repair tool.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Epic web repair

  • subdirectory

    Epicwebservicesltd

Targets

    • Target

      Vanta-Fn.exe

    • Size

      3.1MB

    • MD5

      d41852e4e97ade129efe94cf773d10ff

    • SHA1

      f999477106a8ea6506905abe6effe054c8e3db3b

    • SHA256

      996afa4a4194a60b56825e8589b8cd028cb593f6a619370c15ec04fa2659e500

    • SHA512

      4862f158153d25647901195e6f294bdb1c13ad8ffcaebe000f702f5c1fa49e631b04830baa27e172acf58b1bacbbefb3f99bf6a5d44d90ec21e3b8d9a20ee8cf

    • SSDEEP

      49152:iv4hBYjCO4Dt2d5aKCuVPzlEmVQL0wvwkaGRepECs+k/iLkoGdQTHHB72eh2NT:ivqt2d5aKCuVPzlEmVQ0wvwfGReNg

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

5
T1082

Collection

Data from Local System

1
T1005

Tasks