General

  • Target

    xPP4QxLkmgBB.exe

  • Size

    1.0MB

  • Sample

    230530-r7ttmaab66

  • MD5

    304034ca275b3be98d1b92d28a7ed71a

  • SHA1

    73cb868ddb133f04db518af41420582b85f99c97

  • SHA256

    b7edc8206134842f1452de2fcc1604b40a078d75a2a56391fc5698aef9fc9240

  • SHA512

    3e76ce61d0ac85ac33ebc45f15f504cdf4e4c758b3a5c80668c2e1b55cc290b138abee12851b28d02a9fa38f4b1807f6a401958bc194330d9a3f517e0960f03b

  • SSDEEP

    24576:Raynkc1ZzBvtrZHFjMKY2aq77woIu7el6pRZRcL9:wynkc1ZzBvtrZHFjMKY2Rw3u7el6pR3

Malware Config

Extracted

Family

quasar

Version

2.7.0.0

Botnet

Venom Client

C2

crazydns.linkpc.net:26134

Mutex

JlYM51eW4iZoFyLa2X

Attributes
  • encryption_key

    dRPxHr2NcM6jte8WN3KY

  • install_name

    Venom.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

Targets

    • Target

      xPP4QxLkmgBB.exe

    • Size

      1.0MB

    • MD5

      304034ca275b3be98d1b92d28a7ed71a

    • SHA1

      73cb868ddb133f04db518af41420582b85f99c97

    • SHA256

      b7edc8206134842f1452de2fcc1604b40a078d75a2a56391fc5698aef9fc9240

    • SHA512

      3e76ce61d0ac85ac33ebc45f15f504cdf4e4c758b3a5c80668c2e1b55cc290b138abee12851b28d02a9fa38f4b1807f6a401958bc194330d9a3f517e0960f03b

    • SSDEEP

      24576:Raynkc1ZzBvtrZHFjMKY2aq77woIu7el6pRZRcL9:wynkc1ZzBvtrZHFjMKY2Rw3u7el6pR3

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks