General

  • Target

    Client-built.exe

  • Size

    3.1MB

  • Sample

    230803-va6cyafg9w

  • MD5

    97ca31cf187986d32927e44a55b9492f

  • SHA1

    a88a775bff0eb5fb33883eb1ecfbf41ed18a248e

  • SHA256

    e0b8bdf7e79e5c4e2f9282b430bd4779f27609cef1996e2c633bfacb4ef16463

  • SHA512

    850ca8e9ffda13dc1e1c8a8c0fe96310da974051342717de2358b7917e3939a8eadf1170d4d6d16f02afe815d41fda2061652c5a69e84e32962c2acc53f917c5

  • SSDEEP

    49152:Evfgo2QSaNpzyPllgamb0CZof/JOkJrAMfNLoGdnTHHB72eh2NT:EvIo2QSaNpzyPllgamYCZof/JOkJrJ

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Infected

C2

192.168.1.1:4782

192.168.1.66:4782

dark-crystal.at.ply.gg:4782

AmirAmir8565-21667.portmap.host:4782

AmirAmir8565-20409.portmap.host:20409

Mutex

ff410ede-beff-4970-8e12-7d251057f1fd

Attributes
  • encryption_key

    1B172706DED462B59F2A5056AB06A8DD1EE8491B

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Realtek Audio

  • subdirectory

    SubDir

Targets

    • Target

      Client-built.exe

    • Size

      3.1MB

    • MD5

      97ca31cf187986d32927e44a55b9492f

    • SHA1

      a88a775bff0eb5fb33883eb1ecfbf41ed18a248e

    • SHA256

      e0b8bdf7e79e5c4e2f9282b430bd4779f27609cef1996e2c633bfacb4ef16463

    • SHA512

      850ca8e9ffda13dc1e1c8a8c0fe96310da974051342717de2358b7917e3939a8eadf1170d4d6d16f02afe815d41fda2061652c5a69e84e32962c2acc53f917c5

    • SSDEEP

      49152:Evfgo2QSaNpzyPllgamb0CZof/JOkJrAMfNLoGdnTHHB72eh2NT:EvIo2QSaNpzyPllgamYCZof/JOkJrJ

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks