General

  • Target

    vcac.exe

  • Size

    24.2MB

  • Sample

    230930-pc8cesda39

  • MD5

    0bb88f910f99843a0416c3c651436938

  • SHA1

    38dc0516f6714e1036ffe1fb373335235f02d2d9

  • SHA256

    24ccbebd6c91381401c686aa354355da63a75e81f170ca7abd207c7f017d5da4

  • SHA512

    2dc27e9d692ce2f60ea41f68d924cd6f7974d8316dc61749c048a12e19ada5241626c8f3fbcf8a9b826066d66a8465138e74d078dceda587a8c130cf8b2203a1

  • SSDEEP

    98304:MKBbBWIgWljGxRB/LLqvc22SsaNYfdPBldt6+dBcjHVCU688cIyGOk3ta:94xRBj4B7j4U6gl

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    1

Extracted

Family

quasar

Version

1.4.1

Botnet

user

C2

192.168.0.13:3440

elpepemanca.ddns.net:3440

Mutex

5950a87d-00d0-4fc0-a953-61143318e6d1

Attributes
  • encryption_key

    1A866C514D7B8C5F02AAA72B847C1F305295B74C

  • install_name

    Windows.exe

  • log_directory

    Logs

  • reconnect_delay

    1

  • startup_key

    Discord.exe

  • subdirectory

    System

Targets

    • Target

      vcac.exe

    • Size

      24.2MB

    • MD5

      0bb88f910f99843a0416c3c651436938

    • SHA1

      38dc0516f6714e1036ffe1fb373335235f02d2d9

    • SHA256

      24ccbebd6c91381401c686aa354355da63a75e81f170ca7abd207c7f017d5da4

    • SHA512

      2dc27e9d692ce2f60ea41f68d924cd6f7974d8316dc61749c048a12e19ada5241626c8f3fbcf8a9b826066d66a8465138e74d078dceda587a8c130cf8b2203a1

    • SSDEEP

      98304:MKBbBWIgWljGxRB/LLqvc22SsaNYfdPBldt6+dBcjHVCU688cIyGOk3ta:94xRBj4B7j4U6gl

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible privilege escalation attempt

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks