General

  • Target

    Free Robux.exe

  • Size

    3.1MB

  • Sample

    230803-tk67jsfd6y

  • MD5

    12dfc98e55d187e82fe2207383447e0b

  • SHA1

    efb3fb106202b9a12f1894e703fcee27cb93e28c

  • SHA256

    78980e753b2dc821107c2e8f10df4ff86ca9fde82f7c97b1949c2315ba955f9f

  • SHA512

    410097f00d1bf81b5ab27cc02993b78d9f8ea44d1ff2bee44d322211e282f398fe3d623d295567b67292433720515f29ec6ce1438874e49d09ac266afdfad8b9

  • SSDEEP

    49152:DvBuf2NUaNmwzPWlvdaKM7ZxTwdlRJ64bR3LoGdQTHHB72eh2NT:Dvcf2NUaNmwzPWlvdaB7ZxTwdlRJ6S

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Infected

C2

192.168.1.1:4782

192.168.1.66:4782

dark-crystal.at.ply.gg:4782

Mutex

ff410ede-beff-4970-8e12-7d251057f1fd

Attributes
  • encryption_key

    1B172706DED462B59F2A5056AB06A8DD1EE8491B

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Realtek Audio

  • subdirectory

    SubDir

Targets

    • Target

      Free Robux.exe

    • Size

      3.1MB

    • MD5

      12dfc98e55d187e82fe2207383447e0b

    • SHA1

      efb3fb106202b9a12f1894e703fcee27cb93e28c

    • SHA256

      78980e753b2dc821107c2e8f10df4ff86ca9fde82f7c97b1949c2315ba955f9f

    • SHA512

      410097f00d1bf81b5ab27cc02993b78d9f8ea44d1ff2bee44d322211e282f398fe3d623d295567b67292433720515f29ec6ce1438874e49d09ac266afdfad8b9

    • SSDEEP

      49152:DvBuf2NUaNmwzPWlvdaKM7ZxTwdlRJ64bR3LoGdQTHHB72eh2NT:Dvcf2NUaNmwzPWlvdaB7ZxTwdlRJ6S

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks