General

  • Target

    taskhosts-cleaned.exe

  • Size

    385KB

  • Sample

    230624-ze5z7add5y

  • MD5

    6e5babe25aad66144dd2e15ab97bd38b

  • SHA1

    61d589a0814a1ef9a0b1a06454f9761fe81ddbff

  • SHA256

    fbbb647aeb0707b5897f74bc3616b275406c6fce1ac0409a6f582fdfcc2de147

  • SHA512

    6547309b05f1ffec63c5ea9c92bb536d37ca1b7104df936324ba19dfb53dff0aa9135f3a9bd4aa0ae46a210048db9b5694424e00bd47e2cb2ab63df5a4f52896

  • SSDEEP

    6144:F8jlR5z3XxhxrL8rK/A0j1/zTzTLNozbLRpw34urkR10efUK0:FMlHzHxhV/Aqipw3XQztfK

Malware Config

Extracted

Family

quasar

Version

1.4.0.0

Botnet

Down

C2

simplmizer.duckdns.org:1337

Mutex

rhoc35VS3mkrMtkPb1

Attributes
  • encryption_key

    AN1JmoUwwzfA1Metx4Ze

  • install_name

    taskhost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    EdgeBrowser

  • subdirectory

    SubDir

Targets

    • Target

      taskhosts-cleaned.exe

    • Size

      385KB

    • MD5

      6e5babe25aad66144dd2e15ab97bd38b

    • SHA1

      61d589a0814a1ef9a0b1a06454f9761fe81ddbff

    • SHA256

      fbbb647aeb0707b5897f74bc3616b275406c6fce1ac0409a6f582fdfcc2de147

    • SHA512

      6547309b05f1ffec63c5ea9c92bb536d37ca1b7104df936324ba19dfb53dff0aa9135f3a9bd4aa0ae46a210048db9b5694424e00bd47e2cb2ab63df5a4f52896

    • SSDEEP

      6144:F8jlR5z3XxhxrL8rK/A0j1/zTzTLNozbLRpw34urkR10efUK0:FMlHzHxhV/Aqipw3XQztfK

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks