Resubmissions

13-06-2023 12:59

230613-p8d4fsgc47 10

09-06-2023 12:37

230609-ptf99sch8z 10

05-06-2023 00:58

230605-bbgw7aed45 10

General

  • Target

    reallyrich_protected.exe

  • Size

    3.2MB

  • Sample

    230605-bbgw7aed45

  • MD5

    df5d7280e65d54355447a8cf38dfee00

  • SHA1

    550db0113d38c80e10a08406cdab1b7ba6a7430e

  • SHA256

    0058c7aff1d46a7adb149bdd15392f2b56de364b1c0a5e546c0fbca15b586fe9

  • SHA512

    a929a1a0575d348d072cd1add9fb45a77e0b4a5c378b16bcbb13c8bbb03f742a570e4614472ab224b29e613b93231f13029d10468bbb6ad3017bad77f65a5102

  • SSDEEP

    98304:utrc5NQ18Qicj/J/zB+twLfrmISZEsKoFpCUi:15NzQiYLRiV2sKoKB

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Discord Skids

C2

consider-brochure.at.ply.gg:27804

Mutex

QSR_MUTEX_K74gPsK0rTir6ohMb6

Attributes
  • encryption_key

    7bQbeRbkWBPbfsQ8OJAh

  • install_name

    COM Surrogate.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    SystemHealthTray

  • subdirectory

    SubDir

Targets

    • Target

      reallyrich_protected.exe

    • Size

      3.2MB

    • MD5

      df5d7280e65d54355447a8cf38dfee00

    • SHA1

      550db0113d38c80e10a08406cdab1b7ba6a7430e

    • SHA256

      0058c7aff1d46a7adb149bdd15392f2b56de364b1c0a5e546c0fbca15b586fe9

    • SHA512

      a929a1a0575d348d072cd1add9fb45a77e0b4a5c378b16bcbb13c8bbb03f742a570e4614472ab224b29e613b93231f13029d10468bbb6ad3017bad77f65a5102

    • SSDEEP

      98304:utrc5NQ18Qicj/J/zB+twLfrmISZEsKoFpCUi:15NzQiYLRiV2sKoKB

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

2
T1082

Tasks