Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    Trip Itinerary detail.vbs

  • Size

    245KB

  • Sample

    230614-q8h8vahg74

  • MD5

    e011adb4a7b7e60d89697fd6060a5b83

  • SHA1

    6a7c2953cffe72cb5178d800be718bbadcf7f14b

  • SHA256

    b73dbf4a79bb87a8294bf87271ec249ed831ec72e6e194c3636f78858dcd3ab1

  • SHA512

    c6adbaf622441058d018258adbb2d1cda5b390c80234ea66b1fe9fd149b5adf28f7a8575d6159d25073fde93f712a86831968cf0a0ed710c495581042c275d00

  • SSDEEP

    3072:iC99Sy99y999999999996999999999999N9999SoV969ZA:Z

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://pastebin.com/raw/PUgmUTiH

Extracted

Family

quasar

Version

2.7.0.0

Botnet

Venom Client

C2

crazydns.linkpc.net:26134

Mutex

JlYM51eW4iZoFyLa2X

Attributes
  • encryption_key

    dRPxHr2NcM6jte8WN3KY

  • install_name

    Venom.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

Targets

    • Target

      Trip Itinerary detail.vbs

    • Size

      245KB

    • MD5

      e011adb4a7b7e60d89697fd6060a5b83

    • SHA1

      6a7c2953cffe72cb5178d800be718bbadcf7f14b

    • SHA256

      b73dbf4a79bb87a8294bf87271ec249ed831ec72e6e194c3636f78858dcd3ab1

    • SHA512

      c6adbaf622441058d018258adbb2d1cda5b390c80234ea66b1fe9fd149b5adf28f7a8575d6159d25073fde93f712a86831968cf0a0ed710c495581042c275d00

    • SSDEEP

      3072:iC99Sy99y999999999996999999999999N9999SoV969ZA:Z

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks