Analysis

  • max time kernel
    116s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-05-2023 18:47

General

  • Target

    download.exe

  • Size

    1.0MB

  • MD5

    304034ca275b3be98d1b92d28a7ed71a

  • SHA1

    73cb868ddb133f04db518af41420582b85f99c97

  • SHA256

    b7edc8206134842f1452de2fcc1604b40a078d75a2a56391fc5698aef9fc9240

  • SHA512

    3e76ce61d0ac85ac33ebc45f15f504cdf4e4c758b3a5c80668c2e1b55cc290b138abee12851b28d02a9fa38f4b1807f6a401958bc194330d9a3f517e0960f03b

  • SSDEEP

    24576:Raynkc1ZzBvtrZHFjMKY2aq77woIu7el6pRZRcL9:wynkc1ZzBvtrZHFjMKY2Rw3u7el6pR3

Malware Config

Extracted

Family

quasar

Version

2.7.0.0

Botnet

Venom Client

C2

crazydns.linkpc.net:26134

Mutex

JlYM51eW4iZoFyLa2X

Attributes
  • encryption_key

    dRPxHr2NcM6jte8WN3KY

  • install_name

    Venom.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\download.exe
    "C:\Users\Admin\AppData\Local\Temp\download.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4480

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4480-133-0x0000000000D70000-0x0000000000E80000-memory.dmp
    Filesize

    1.1MB

  • memory/4480-134-0x0000000005E50000-0x00000000063F4000-memory.dmp
    Filesize

    5.6MB

  • memory/4480-135-0x00000000058A0000-0x0000000005932000-memory.dmp
    Filesize

    584KB

  • memory/4480-136-0x0000000005A40000-0x0000000005A50000-memory.dmp
    Filesize

    64KB

  • memory/4480-137-0x0000000005C50000-0x0000000005CB6000-memory.dmp
    Filesize

    408KB

  • memory/4480-138-0x0000000006860000-0x0000000006872000-memory.dmp
    Filesize

    72KB

  • memory/4480-139-0x0000000005A40000-0x0000000005A50000-memory.dmp
    Filesize

    64KB

  • memory/4480-140-0x0000000007440000-0x000000000747C000-memory.dmp
    Filesize

    240KB

  • memory/4480-141-0x0000000007400000-0x000000000740A000-memory.dmp
    Filesize

    40KB