General

  • Target

    5a8434f899549874f8114dda6a6e2763.bin

  • Size

    487KB

  • Sample

    230920-bzw11sdc4w

  • MD5

    04cf390094d8cdaec4e89a281056078c

  • SHA1

    bd2984feb021ae8ffa90a40400b8a91568a564c5

  • SHA256

    5ae5cbd5ef29c6386888ce1c5b15a44a07e27f6be64ca5c450d29745a2847e14

  • SHA512

    0da92d449b9c7dff1382b9c7723a9b5d964e2ffcaf27eb0651686992ea463426bf96e875840d866d23664a968d528e860921a50e1ec6762afefa50090487fd32

  • SSDEEP

    12288:IaHoqFlmRgUx2RiP+E1xNj8IVGeNCsXhU82mfGDZ8IHh4/V6Jui:I4uRO6+gecvXhU82mfG97Hh4oui

Malware Config

Extracted

Family

quasar

Version

2.7.0.0

Botnet

Venom Client

C2

crazydns.linkpc.net:3000

Mutex

ER5Ojs5Por1j5joXR6

Attributes
  • encryption_key

    HHtj6qkHuyo7mzRB7Q0O

  • install_name

    Venom.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

Targets

    • Target

      83006c24730b2d7fb7506451aee3d6bb85cc27d64e230630bc66517c7ba9ed21.bin

    • Size

      1.0MB

    • MD5

      5a8434f899549874f8114dda6a6e2763

    • SHA1

      5950904de381e2e16411b315ed91d683b11bd66e

    • SHA256

      83006c24730b2d7fb7506451aee3d6bb85cc27d64e230630bc66517c7ba9ed21

    • SHA512

      c6953fcaebd25e13c2d30362f60e3a2defc7c83e640b023f766dbbf305c30332d654d2882b8247126909f2bc994ec2268f0ee0e70a607d910a53b6ae8b98ed9b

    • SSDEEP

      24576:Eaynkc1ZzBvtrZHFjMKY2GocjuN6Yelp+QlGVB/yqR:1ynkc1ZzBvtrZHFjMKY2kjuN6Yelpju

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks